ecosystem stringclasses 11
values | vuln_id stringlengths 10 19 | summary stringlengths 4 220 ⌀ | details stringlengths 34 13.5k | aliases stringlengths 17 87 ⌀ | modified_date stringdate 2019-03-26 14:13:00 2022-05-10 08:46:52 | published_date stringdate 2012-06-17 03:41:00 2022-05-10 08:46:50 | severity stringclasses 5
values | score float64 0 10 ⌀ | cwe_id stringclasses 581
values | refs stringlengths 82 11.6k | introduced stringclasses 843
values | code_refs stringlengths 46 940 | commits stringlengths 46 940 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Maven | GHSA-p4q6-qxjx-8jgp | Directory Traversal in spring-boot-actuator-logview | ### Impact
The nature of this library is to expose a log file directory via admin (spring boot actuator) HTTP endpoints. Both the filename to view and a base folder (relative to the logging folder root) can be specified via request parameters. While the filename parameter was checked to prevent directory traversal expl... | {'CVE-2021-21234'} | 2022-03-03T05:13:40.104264Z | 2021-01-05T17:29:40Z | HIGH | null | {'CWE-22'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-21234', 'https://github.com/lukashinsch/spring-boot-actuator-logview/commit/1c76e1ec3588c9f39e1a94bf27b5ff56eb8b17d6', 'https://github.com/lukashinsch/spring-boot-actuator-logview/commit/760acbb939a8d1f7d1a7dfcd51ca848eea04e772', 'https://github.com/lukashinsch/spring-boot-ac... | null | {'https://github.com/lukashinsch/spring-boot-actuator-logview/commit/760acbb939a8d1f7d1a7dfcd51ca848eea04e772', 'https://github.com/lukashinsch/spring-boot-actuator-logview/commit/1c76e1ec3588c9f39e1a94bf27b5ff56eb8b17d6'} | {'https://github.com/lukashinsch/spring-boot-actuator-logview/commit/1c76e1ec3588c9f39e1a94bf27b5ff56eb8b17d6', 'https://github.com/lukashinsch/spring-boot-actuator-logview/commit/760acbb939a8d1f7d1a7dfcd51ca848eea04e772'} |
Maven | GHSA-c8hm-7hpq-7jhg | High severity vulnerability that affects com.fasterxml.jackson.core:jackson-databind | FasterXML jackson-databind 2.x before 2.9.8 might allow attackers to have unspecified impact by leveraging failure to block the jboss-common-core class from polymorphic deserialization. | {'CVE-2018-19362'} | 2022-03-03T05:12:53.415813Z | 2019-01-04T19:07:03Z | HIGH | null | {'CWE-502'} | {'http://www.securityfocus.com/bid/107985', 'https://access.redhat.com/errata/RHSA-2019:3140', 'https://nvd.nist.gov/vuln/detail/CVE-2018-19362', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html', 'https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8... | null | {'https://github.com/FasterXML/jackson-databind/commit/42912cac4753f3f718ece875e4d486f8264c2f2b'} | {'https://github.com/FasterXML/jackson-databind/commit/42912cac4753f3f718ece875e4d486f8264c2f2b'} |
Maven | GHSA-j3f7-7rmc-6wqj | Improper certificate management in AWS IoT Device SDK v2 | The AWS IoT Device SDK v2 for Java, Python, C++ and Node.js appends a user supplied Certificate Authority (CA) to the root CAs instead of overriding it on macOS systems. Additionally, SNI validation is also not enabled when the CA has been “overridden”. TLS handshakes will thus succeed if the peer can be verified eithe... | {'CVE-2021-40831'} | 2022-03-03T05:14:12.538986Z | 2021-11-24T20:35:03Z | MODERATE | null | {'CWE-295'} | {'https://github.com/aws/aws-iot-device-sdk-python-v2/commit/5aef82573202309063eb540b72cee0e565f85a2d', 'https://github.com/aws/aws-iot-device-sdk-python-v2', 'https://github.com/awslabs/aws-c-io/', 'https://github.com/aws/aws-iot-device-sdk-cpp-v2', 'https://github.com/aws/aws-iot-device-sdk-js-v2', 'https://github.co... | null | {'https://github.com/aws/aws-iot-device-sdk-js-v2/commit/22f1989f5bdb0bdd9c912a5a2d255ee6c0854f68', 'https://github.com/aws/aws-iot-device-sdk-java-v2/commit/46375e9b1bfb34109b9ff3b1eff9c770f9daa186', 'https://github.com/aws/aws-iot-device-sdk-python-v2/commit/5aef82573202309063eb540b72cee0e565f85a2d'} | {'https://github.com/aws/aws-iot-device-sdk-js-v2/commit/22f1989f5bdb0bdd9c912a5a2d255ee6c0854f68', 'https://github.com/aws/aws-iot-device-sdk-python-v2/commit/5aef82573202309063eb540b72cee0e565f85a2d', 'https://github.com/aws/aws-iot-device-sdk-java-v2/commit/46375e9b1bfb34109b9ff3b1eff9c770f9daa186'} |
Maven | GHSA-rcvx-rmvf-mxch | Cross-site Scripting in Eclipse Hawkbit | In all version of Eclipse Hawkbit prior to 0.3.0M7, the HTTP 404 (Not Found) JSON response body returned by the REST API may contain unsafe characters within the path attribute. Sending a POST request to a non existing resource will return the full path from the given URL unescaped to the client. | {'CVE-2020-27219'} | 2022-03-03T05:13:16.547284Z | 2022-02-09T22:19:44Z | MODERATE | null | {'CWE-79'} | {'https://bugs.eclipse.org/bugs/show_bug.cgi?id=570289', 'https://github.com/eclipse/hawkbit/issues/1067', 'https://github.com/eclipse/hawkbit/commit/94b7c12cde1b38eda5414bd88d6d068008cfb9f9', 'https://nvd.nist.gov/vuln/detail/CVE-2020-27219'} | null | {'https://github.com/eclipse/hawkbit/commit/94b7c12cde1b38eda5414bd88d6d068008cfb9f9'} | {'https://github.com/eclipse/hawkbit/commit/94b7c12cde1b38eda5414bd88d6d068008cfb9f9'} |
Maven | GHSA-q485-j897-qc27 | Moderate severity vulnerability that affects com.mchange:c3p0 | c3p0 0.9.5.2 allows XXE in extractXmlConfigFromInputStream in com/mchange/v2/c3p0/cfg/C3P0ConfigXmlUtils.java during initialization. | {'CVE-2018-20433'} | 2022-03-03T05:13:58.482425Z | 2019-01-07T19:14:34Z | CRITICAL | null | {'CWE-611'} | {'https://github.com/zhutougg/c3p0/commit/2eb0ea97f745740b18dd45e4a909112d4685f87b', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MQ47OFV57Y2DAHMGA5H3JOL4WHRWRFN4/', 'https://github.com/advisories/GHSA-q485-j897-qc27', 'https://github.com/zhutougg/c3p0', 'https://lists... | null | {'https://github.com/zhutougg/c3p0/commit/2eb0ea97f745740b18dd45e4a909112d4685f87b'} | {'https://github.com/zhutougg/c3p0/commit/2eb0ea97f745740b18dd45e4a909112d4685f87b'} |
Maven | GHSA-jrg3-qq99-35g7 | Deserialization of Untrusted Data in Jodd | Jodd before 5.0.4 performs Deserialization of Untrusted JSON Data when setClassMetadataName is set. | {'CVE-2018-21234'} | 2022-04-26T18:01:55.893226Z | 2022-02-10T23:03:26Z | CRITICAL | null | {'CWE-502'} | {'https://lists.apache.org/thread.html/rdce006b282e56c5cc73cdf452c51c5097154d0503396d62f48abbeae@%3Cgitbox.hive.apache.org%3E', 'https://lists.apache.org/thread.html/rf458683390d6650b26a2c8ba8ad396e038e520ad1cc3f3f1e20514d9@%3Cdev.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r317aec95c436848233047af7ecb3c... | null | {'https://github.com/oblac/jodd/commit/9bffc3913aeb8472c11bb543243004b4b4376f16'} | {'https://github.com/oblac/jodd/commit/9bffc3913aeb8472c11bb543243004b4b4376f16'} |
Maven | GHSA-grc3-8q8m-4j7c | Improper privilege handling in Apache Accumulo | Apache Accumulo versions 1.5.0 through 1.10.0 and version 2.0.0 do not properly check the return value of some policy enforcement functions before permitting an authenticated user to perform certain administrative operations. Specifically, the return values of the 'canFlush' and 'canPerformSystemActions' security funct... | {'CVE-2020-17533'} | 2022-03-03T05:14:10.252302Z | 2022-02-09T22:37:59Z | HIGH | null | {'CWE-732', 'CWE-280'} | {'http://www.openwall.com/lists/oss-security/2020/12/29/1', 'https://lists.apache.org/thread.html/rf8c1a787b6951d3dacb9ec58f0bf1633790c91f54ff10c6f8ff9d8ed%40%3Cuser.accumulo.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-17533', 'https://lists.apache.org/thread.html/rf8c1a787b6951d3dacb9ec58f0bf1633790c91f... | null | {'https://github.com/apache/accumulo/commit/877ad502f6857e48342664e4b0ce83db74e4cda4'} | {'https://github.com/apache/accumulo/commit/877ad502f6857e48342664e4b0ce83db74e4cda4'} |
Maven | GHSA-qcj7-g2j5-g7r3 | In Bouncy Castle JCE Provider ECDSA does not fully validate ASN.1 encoding of signature on verification | In the Bouncy Castle JCE Provider version 1.55 and earlier ECDSA does not fully validate ASN.1 encoding of signature on verification. It is possible to inject extra elements in the sequence making up the signature and still have it validate, which in some cases may allow the introduction of 'invisible' data into a sign... | {'CVE-2016-1000342'} | 2022-04-27T13:30:06.880260Z | 2018-10-17T16:24:12Z | HIGH | null | {'CWE-347'} | {'https://nvd.nist.gov/vuln/detail/CVE-2016-1000342', 'https://github.com/bcgit/bc-java/commit/843c2e60f67d71faf81d236f448ebbe56c62c647#diff-25c3c78db788365f36839b3f2d3016b9', 'https://github.com/bcgit/bc-java', 'https://security.netapp.com/advisory/ntap-20181127-0004/', 'https://access.redhat.com/errata/RHSA-2018:2927... | null | {'https://github.com/bcgit/bc-java/commit/843c2e60f67d71faf81d236f448ebbe56c62c647#diff-25c3c78db788365f36839b3f2d3016b9'} | {'https://github.com/bcgit/bc-java/commit/843c2e60f67d71faf81d236f448ebbe56c62c647#diff-25c3c78db788365f36839b3f2d3016b9'} |
Maven | GHSA-6vqp-h455-42mr | Uncontrolled Memory Allocation in Apache PDFBox | A carefully crafted PDF file can trigger an OutOfMemory-Exception while loading the file. This issue affects Apache PDFBox version 2.0.22 and prior 2.0.x versions. | {'CVE-2021-27906'} | 2022-04-22T18:30:22.909055Z | 2021-05-13T22:30:13Z | MODERATE | null | {'CWE-789'} | {'https://github.com/apache/pdfbox/commit/8c47be1011c11dc47300faecffd8ab32fba3646f', 'https://lists.apache.org/thread.html/r4cbc3f6981cd0a1a482531df9d44e4c42a7f63342a7ba78b7bff8a1b@%3Cnotifications.james.apache.org%3E', 'https://issues.apache.org/jira/browse/PDFBOX-5112', 'https://lists.fedoraproject.org/archives/list/... | null | {'https://github.com/apache/pdfbox/commit/8c47be1011c11dc47300faecffd8ab32fba3646f'} | {'https://github.com/apache/pdfbox/commit/8c47be1011c11dc47300faecffd8ab32fba3646f'} |
Maven | GHSA-72m5-fvvv-55m6 | Observable Differences in Behavior to Error Inputs in Bouncy Castle | In Legion of the Bouncy Castle BC before 1.55 and BC-FJA before 1.0.2, attackers can obtain sensitive information about a private exponent because of Observable Differences in Behavior to Error Inputs. This occurs in org.bouncycastle.crypto.encodings.OAEPEncoding. Sending invalid ciphertext that decrypts to a short pay... | {'CVE-2020-26939'} | 2022-03-03T05:12:45.225730Z | 2021-04-22T16:16:49Z | MODERATE | null | {'CWE-203'} | {'https://lists.apache.org/thread.html/r8c36ba34e80e05eecb1f80071cc834d705616f315b634ec0c7d8f42e@%3Cissues.solr.apache.org%3E', 'https://github.com/bcgit/bc-java/commit/930f8b274c4f1f3a46e68b5441f1e7fadb57e8c1', 'https://security.netapp.com/advisory/ntap-20201202-0005/', 'https://lists.debian.org/debian-lts-announce/20... | null | {'https://github.com/bcgit/bc-java/commit/930f8b274c4f1f3a46e68b5441f1e7fadb57e8c1'} | {'https://github.com/bcgit/bc-java/commit/930f8b274c4f1f3a46e68b5441f1e7fadb57e8c1'} |
Maven | GHSA-wx5j-54mm-rqqq | HTTP request smuggling in io.netty:netty-codec-http | ### Impact
Netty currently just skips control chars when these are present at the beginning / end of the header name. We should better fail fast as these are not allowed by the spec and could lead to HTTP request smuggling.
Failing to do the validation might cause netty to "sanitize" header names before it forward th... | {'CVE-2021-43797'} | 2022-04-22T15:47:44.975474Z | 2021-12-09T19:09:17Z | MODERATE | null | {'CWE-444'} | {'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/netty/netty/commit/07aa6b5938a8b6ed7a6586e066400e2643897323', 'https://github.com/netty/netty/security/advisories/GHSA-wx5j-54mm-rqqq', 'https://security.netapp.com/advisory/ntap-20220107-0003/', 'https://github.com/netty/netty/pull/11891', ... | null | {'https://github.com/netty/netty/commit/07aa6b5938a8b6ed7a6586e066400e2643897323'} | {'https://github.com/netty/netty/commit/07aa6b5938a8b6ed7a6586e066400e2643897323'} |
Maven | GHSA-5pv7-hx9m-8jh3 | Missing permission checks in Jenkins Publish Over FTP Plugin | Missing permission checks in Jenkins Publish Over FTP Plugin prior to 1.17 allow attackers with Overall/Read permission to connect to an FTP server using attacker-specified credentials. | {'CVE-2022-29051'} | 2022-05-05T16:18:16.198799Z | 2022-04-13T00:00:16Z | MODERATE | null | {'CWE-862'} | {'https://github.com/jenkinsci/publish-over-ftp-plugin', 'https://nvd.nist.gov/vuln/detail/CVE-2022-29051', 'https://github.com/jenkinsci/publish-over-ftp-plugin/commit/b265201428557ab91304e06199ad38221efc23e7', 'https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2321'} | null | {'https://github.com/jenkinsci/publish-over-ftp-plugin/commit/b265201428557ab91304e06199ad38221efc23e7'} | {'https://github.com/jenkinsci/publish-over-ftp-plugin/commit/b265201428557ab91304e06199ad38221efc23e7'} |
Maven | GHSA-vjw7-6gfq-6wf5 | Path Traversal in Eclipse Vert | In Eclipse Vert.x 3.4.x up to 3.9.4, 4.0.0-milestone1, 4.0.0-milestone2, 4.0.0-milestone3, 4.0.0-milestone4, 4.0.0-milestone5, 4.0.0.Beta1, 4.0.0.Beta2, and 4.0.0.Beta3, StaticHandler doesn't correctly processes back slashes on Windows Operating systems, allowing, escape the webroot folder to the current working direct... | {'CVE-2019-17640'} | 2022-03-03T05:13:34.325224Z | 2022-02-10T20:28:57Z | CRITICAL | null | {'CWE-22', 'CWE-23'} | {'https://lists.apache.org/thread.html/r591f6932560c8c46cee87415afed92924a982189fea7f7c9096f8e33@%3Ccommits.pulsar.apache.org%3E', 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=567416', 'https://lists.apache.org/thread.html/r8383b5e7344a8b872e430ad72241b84b83e9701d275c602cfe34a941@%3Ccommits.servicecomb.apache.org%3E'... | null | {'https://github.com/vert-x3/vertx-web/commit/b12f7c4c6576a8adc3f683b2899de4b0e7d099e4'} | {'https://github.com/vert-x3/vertx-web/commit/b12f7c4c6576a8adc3f683b2899de4b0e7d099e4'} |
Maven | GHSA-f92j-qf46-p6vm | Reflected Cross-site Scripting in ACS Commons | ### Impact
ACS Commons version 4.9.2 (and earlier) suffers from a Reflected Cross-site Scripting (XSS) vulnerability in version-compare and page-compare due to invalid JCR characters that are not handled correctly.
An attacker could potentially exploit this vulnerability to inject malicious JavaScript content into vu... | {'CVE-2021-21028'} | 2022-03-03T05:12:54.085750Z | 2021-02-02T15:46:52Z | HIGH | null | {'CWE-79', 'CWE-416'} | {'https://github.com/Adobe-Consulting-Services/acs-aem-commons/security/advisories/GHSA-f92j-qf46-p6vm', 'https://helpx.adobe.com/security/products/acrobat/apsb21-09.html', 'https://github.com/Adobe-Consulting-Services/acs-aem-commons/commit/14d769c86606c4ce9a93c47a19f87e1ad72788d6', 'https://nvd.nist.gov/vuln/detail/C... | null | {'https://github.com/Adobe-Consulting-Services/acs-aem-commons/commit/14d769c86606c4ce9a93c47a19f87e1ad72788d6'} | {'https://github.com/Adobe-Consulting-Services/acs-aem-commons/commit/14d769c86606c4ce9a93c47a19f87e1ad72788d6'} |
Maven | GHSA-rcjj-h6gh-jf3r | Information Disclosure in Apache Groovy | Apache Groovy provides extension methods to aid with creating temporary directories. Prior to this fix, Groovy's implementation of those extension methods was using a now superseded Java JDK method call that is potentially not secure on some operating systems in some contexts. Users not using the extension methods ment... | {'CVE-2020-17521'} | 2022-04-22T18:30:45.285392Z | 2020-12-09T19:03:03Z | MODERATE | null | {'CWE-379'} | {'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/r4b2f13c302eec98838ff7475253091fb9b75bc1038016ba00ebf6c08@%3Cdev.atlas.apache.org%3E', 'https://lists.apache.org/thread.html/rea63a4666ba245d2892471307772a2d8ce0f0741f341d6576625c1b3@%3Cdev.atlas.apache.org%3E', 'https://gr... | null | {'https://github.com/apache/groovy/commit/bcbe5c4c76db83736166530647c024ac1e47ef28'} | {'https://github.com/apache/groovy/commit/bcbe5c4c76db83736166530647c024ac1e47ef28'} |
Maven | GHSA-rmr5-cpv2-vgjf | Denial of Service by injecting highly recursive collections or maps in XStream | ### Impact
The vulnerability may allow a remote attacker to allocate 100% CPU time on the target system depending on CPU type or parallel execution of such a payload resulting in a denial of service only by manipulating the processed input stream.
### Patches
XStream 1.4.19 monitors and accumulates the time it takes t... | {'CVE-2021-43859'} | 2022-04-22T15:47:34.675024Z | 2022-02-01T00:48:15Z | HIGH | null | {'CWE-502', 'CWE-400'} | {'https://github.com/x-stream/xstream/security/advisories/GHSA-rmr5-cpv2-vgjf', 'https://github.com/x-stream/xstream/commit/e8e88621ba1c85ac3b8620337dd672e0c0c3a846', 'http://www.openwall.com/lists/oss-security/2022/02/09/1', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/messag... | null | {'https://github.com/x-stream/xstream/commit/e8e88621ba1c85ac3b8620337dd672e0c0c3a846'} | {'https://github.com/x-stream/xstream/commit/e8e88621ba1c85ac3b8620337dd672e0c0c3a846'} |
Maven | GHSA-645p-88qh-w398 | High severity vulnerability that affects com.fasterxml.jackson.core:jackson-databind | FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to execute arbitrary code by leveraging failure to block the slf4j-ext class from polymorphic deserialization. | {'CVE-2018-14718'} | 2022-03-03T05:12:37.404567Z | 2019-01-04T19:06:55Z | CRITICAL | null | {'CWE-502'} | {'https://access.redhat.com/errata/RHSA-2019:3140', 'https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html', 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'https://ac... | null | {'https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44'} | {'https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44'} |
Maven | GHSA-v9j2-q4q5-cxh4 | No CSRF protection on the password change form | ### Impact
It's possible for forge an URL that, when accessed by an admin, will reset the password of any user in XWiki.
### Patches
The problem has been patched in XWiki 12.10.5, 13.2RC1.
### Workarounds
It's possible to apply the patch manually by modifying the `register_macros.vm` template like in https://github.c... | {'CVE-2021-32730'} | 2021-07-02T16:41:31Z | 2021-07-02T19:19:13Z | MODERATE | null | {'CWE-352'} | {'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-v9j2-q4q5-cxh4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32730', 'https://jira.xwiki.org/browse/XWIKI-18315', 'https://github.com/xwiki/xwiki-platform/commit/0a36dbcc5421d450366580217a47cc44d32f7257'} | null | {'https://github.com/xwiki/xwiki-platform/commit/0a36dbcc5421d450366580217a47cc44d32f7257'} | {'https://github.com/xwiki/xwiki-platform/commit/0a36dbcc5421d450366580217a47cc44d32f7257'} |
Maven | GHSA-6jv7-28mv-qp9c | Missing permission check in Jenkins autonomiq Plugin | A missing permission check in Jenkins autonomiq Plugin 1.15 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials. | {'CVE-2022-25195'} | 2022-05-04T20:59:04Z | 2022-02-16T00:01:23Z | MODERATE | null | {'CWE-862'} | {'https://github.com/jenkinsci/autonomiq-plugin', 'https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2545', 'https://github.com/jenkinsci/autonomiq-plugin/commit/e06b1ff67664a90819c9561bbc12f4c6e593d1dc', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25195'} | null | {'https://github.com/jenkinsci/autonomiq-plugin/commit/e06b1ff67664a90819c9561bbc12f4c6e593d1dc'} | {'https://github.com/jenkinsci/autonomiq-plugin/commit/e06b1ff67664a90819c9561bbc12f4c6e593d1dc'} |
Maven | GHSA-3rhm-67j6-42jq | Moderate severity vulnerability that affects com.jason-goodwin:authentikat-jwt_2.12 | A time-sensitive equality check on the JWT signature in the JsonWebToken.validate method in main/scala/authentikat/jwt/JsonWebToken.scala in authentikat-jwt (aka com.jason-goodwin/authentikat-jwt) version 0.4.5 and earlier allows the supplier of a JWT token to guess bit after bit of the signature by repeating validatio... | {'CVE-2017-18239'} | 2022-03-03T05:13:53.187473Z | 2018-11-09T17:50:40Z | CRITICAL | null | null | {'https://github.com/jasongoodwin/authentikat-jwt/commit/2d2fa0d40ac8f2f7aa7e9b070fa1a25eee082cb0', 'https://github.com/jasongoodwin/authentikat-jwt/issues/12', 'https://github.com/jasongoodwin/authentikat-jwt', 'https://github.com/jasongoodwin/authentikat-jwt/pull/36', 'https://nvd.nist.gov/vuln/detail/CVE-2017-18239'... | null | {'https://github.com/jasongoodwin/authentikat-jwt/commit/2d2fa0d40ac8f2f7aa7e9b070fa1a25eee082cb0'} | {'https://github.com/jasongoodwin/authentikat-jwt/commit/2d2fa0d40ac8f2f7aa7e9b070fa1a25eee082cb0'} |
Maven | GHSA-338v-3958-8v8r | Information disclosure in JBoss Weld | Race condition in JBoss Weld before 2.2.8 and 3.x before 3.0.0 Alpha3 allows remote attackers to obtain information from a previous conversation via vectors related to a stale thread state. | {'CVE-2014-8122'} | 2022-03-03T05:12:41.722214Z | 2020-06-10T20:54:15Z | MODERATE | null | {'CWE-362'} | {'https://nvd.nist.gov/vuln/detail/CVE-2014-8122', 'http://rhn.redhat.com/errata/RHSA-2015-0773.html', 'http://rhn.redhat.com/errata/RHSA-2015-0920.html', 'http://rhn.redhat.com/errata/RHSA-2015-0218.html', 'https://github.com/weld/core/commit/8e413202fa1af08c09c580f444e4fd16874f9c65', 'http://rhn.redhat.com/errata/RHS... | null | {'https://github.com/weld/core/commit/6808b11cd6d97c71a2eed754ed4f955acd789086', 'https://github.com/weld/core/commit/29fd1107fd30579ad9bb23fae4dc3ba464205745', 'https://github.com/weld/core/commit/8e413202fa1af08c09c580f444e4fd16874f9c65'} | {'https://github.com/weld/core/commit/8e413202fa1af08c09c580f444e4fd16874f9c65', 'https://github.com/weld/core/commit/29fd1107fd30579ad9bb23fae4dc3ba464205745', 'https://github.com/weld/core/commit/6808b11cd6d97c71a2eed754ed4f955acd789086'} |
Maven | GHSA-pc22-3g76-gm6j | Generator Web Application: Local Privilege Escalation Vulnerability via System Temp Directory | ### Impact
On Unix like systems, the system's temporary directory is shared between all users on that system. A collocated user can observe the process of creating a temporary sub directory in the shared temporary directory and race to complete the creation of the temporary subdirectory.
This vulnerability is local ... | {'CVE-2021-21363'} | 2022-03-03T05:13:14.024392Z | 2021-03-11T03:09:16Z | LOW | null | {'CWE-379', 'CWE-378'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-21363', 'https://github.com/swagger-api/swagger-codegen/security/advisories/GHSA-pc22-3g76-gm6j', 'https://github.com/swagger-api/swagger-codegen/commit/987ea7a30b463cc239580d6ad166c707ae942a89'} | null | {'https://github.com/swagger-api/swagger-codegen/commit/987ea7a30b463cc239580d6ad166c707ae942a89'} | {'https://github.com/swagger-api/swagger-codegen/commit/987ea7a30b463cc239580d6ad166c707ae942a89'} |
Maven | GHSA-r8j4-96mx-rjcc | Improper Restriction of XML External Entity Reference in skylot/jadx | skylot/jadx prior to 1.3.2 is vulnerable to Improper Restriction of XML External Entities when a user is tricked into exporting a malicious APK file (via the -e option) containing a crafted AndroidManifest.xml / strings.xml to gradle, leading to possible local file disclosure. | {'CVE-2022-0219'} | 2022-03-03T05:13:21.676040Z | 2022-01-21T18:13:42Z | MODERATE | null | {'CWE-611'} | {'https://github.com/skylot/jadx/commit/d22db30166e7cb369d72be41382bb63ac8b81c52', 'https://github.com/skylot/jadx', 'https://huntr.dev/bounties/0d093863-29e8-4dd7-a885-64f76d50bf5e', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0219'} | null | {'https://github.com/skylot/jadx/commit/d22db30166e7cb369d72be41382bb63ac8b81c52'} | {'https://github.com/skylot/jadx/commit/d22db30166e7cb369d72be41382bb63ac8b81c52'} |
Maven | GHSA-x3rh-m7vp-35f2 | Operation on a Resource after Expiration or Release in Jetty Server | In Eclipse Jetty, versions 9.4.27.v20200227 to 9.4.29.v20200521, in case of too large response headers, Jetty throws an exception to produce an HTTP 431 error. When this happens, the ByteBuffer containing the HTTP response headers is released back to the ByteBufferPool twice. Because of this double release, two threads... | {'CVE-2019-17638'} | 2022-03-03T05:13:52.159814Z | 2020-08-05T14:52:59Z | CRITICAL | null | {'CWE-675', 'CWE-672'} | {'https://lists.apache.org/thread.html/r521168299e023fb075b57afe33d17ff1d09e8a10e0fd8c775ea0e028@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r9a2cfa56d30782a0c17a5deb951a622d1f5c8de48e1c3b578ffc2a84@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r29073905dc9139d0d7a1... | null | {'https://github.com/eclipse/jetty.project/commit/ff8ae56fa939c3477a0cdd1ff56ce3d902f08fba'} | {'https://github.com/eclipse/jetty.project/commit/ff8ae56fa939c3477a0cdd1ff56ce3d902f08fba'} |
Maven | GHSA-6h7w-fc84-x7p6 | StaticFile.fromUrl can leak presence of a directory | ### Impact
`StaticFile.fromUrl` can leak the presence of a directory on a server when the `URL` scheme is not `file://`, and the URL points to a fetchable resource under its scheme and authority. The function returns `F[None]`, indicating no resource, if `url.getFile` is a directory, without first checking the scheme... | {'CVE-2021-32643'} | 2021-05-27T21:17:06Z | 2021-05-28T15:54:39Z | MODERATE | null | {'CWE-22'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-32643', 'https://mvnrepository.com/artifact/org.http4s/http4s-core', 'https://github.com/http4s/http4s/security/advisories/GHSA-6h7w-fc84-x7p6', 'https://github.com/http4s/http4s/commit/52e1890665410b4385e37b96bc49c5e3c708e4e9'} | null | {'https://github.com/http4s/http4s/commit/52e1890665410b4385e37b96bc49c5e3c708e4e9'} | {'https://github.com/http4s/http4s/commit/52e1890665410b4385e37b96bc49c5e3c708e4e9'} |
Maven | GHSA-673j-qm5f-xpv8 | Arbitrary File Write Vulnerability | ### Overview
The connection properties for configuring a pgjdbc connection are not meant to be exposed to an unauthenticated attacker. While allowing an attacker to specify arbitrary connection properties could lead to a compromise of a system, that's a defect of an application that allows unauthenticated attackers tha... | null | 2022-03-03T05:13:55.969503Z | 2022-02-16T00:08:18Z | MODERATE | null | null | {'https://github.com/pgjdbc/pgjdbc', 'https://github.com/pgjdbc/pgjdbc/commit/f6d47034a4ce292e1a659fa00963f6f713117064', 'https://github.com/pgjdbc/pgjdbc/security/advisories/GHSA-673j-qm5f-xpv8'} | null | {'https://github.com/pgjdbc/pgjdbc/commit/f6d47034a4ce292e1a659fa00963f6f713117064'} | {'https://github.com/pgjdbc/pgjdbc/commit/f6d47034a4ce292e1a659fa00963f6f713117064'} |
Maven | GHSA-wcp5-m52f-mhh5 | Improper Restriction of XML External Entity Reference in MPXJ | "MPXJ through 8.1.3 allows XXE attacks. This affects the GanttProjectReader and PhoenixReader components." | {'CVE-2020-25020'} | 2022-03-03T05:14:17.857779Z | 2021-05-07T15:54:36Z | CRITICAL | null | {'CWE-611'} | {'https://github.com/joniles/mpxj/pull/178/commits/c3e457f7a16facfe563eade82b0fa8736a8c96f9', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25020', 'https://github.com/joniles/mpxj/releases/tag/v8.1.4'} | null | {'https://github.com/joniles/mpxj/pull/178/commits/c3e457f7a16facfe563eade82b0fa8736a8c96f9'} | {'https://github.com/joniles/mpxj/pull/178/commits/c3e457f7a16facfe563eade82b0fa8736a8c96f9'} |
Maven | GHSA-qmqc-x3r4-6v39 | Polymorphic deserialization of malicious object in jackson-databind | A flaw was discovered in FasterXML jackson-databind in all versions before 2.9.10 and 2.10.0, where it would permit polymorphic deserialization of malicious objects using the xalan JNDI gadget when used in conjunction with polymorphic type handling methods such as `enableDefaultTyping()` or when @JsonTypeInfo is using ... | {'CVE-2019-14893'} | 2022-03-03T05:13:31.341201Z | 2020-05-15T18:59:07Z | HIGH | null | {'CWE-502'} | {'https://access.redhat.com/errata/RHSA-2020:0729', 'https://nvd.nist.gov/vuln/detail/CVE-2019-14893', 'https://github.com/FasterXML/jackson-databind/commit/998efd708284778f29d83d7962a9bd935c228317', 'https://github.com/FasterXML/jackson-databind/issues/2469', 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24... | null | {'https://github.com/FasterXML/jackson-databind/commit/998efd708284778f29d83d7962a9bd935c228317'} | {'https://github.com/FasterXML/jackson-databind/commit/998efd708284778f29d83d7962a9bd935c228317'} |
Maven | GHSA-g6v7-vqhx-6v6c | XML External Entity Reference in org.opencms:opencms-core | An XML external entity (XXE) vulnerability in Alkacon OpenCms 11.0, 11.0.1 and 11.0.2 allows remote authenticated users with edit privileges to exfiltrate files from the server's file system by uploading a crafted SVG document. | {'CVE-2021-3312'} | 2022-03-03T05:12:54.278811Z | 2021-10-12T17:23:40Z | MODERATE | null | {'CWE-611'} | {'https://github.com/alkacon/opencms-core/issues/721', 'https://github.com/alkacon/opencms-core', 'https://github.com/alkacon/opencms-core/releases', 'https://github.com/alkacon/opencms-core/commit/92e035423aa6967822d343e54392d4291648c0ee', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3312', 'https://github.com/alkacon/o... | null | {'https://github.com/alkacon/opencms-core/commit/92e035423aa6967822d343e54392d4291648c0ee'} | {'https://github.com/alkacon/opencms-core/commit/92e035423aa6967822d343e54392d4291648c0ee'} |
Maven | GHSA-rfmp-jvr7-hx78 | Inadequate Encryption Strength in Apache NiFi | In Apache NiFi 1.2.0 to 1.11.4, the NiFi UI and API were protected by mandating TLS v1.2, as well as listening connections established by processors like ListenHTTP, HandleHttpRequest, etc. However intracluster communication such as cluster request replication, Site-to-Site, and load balanced queues continued to suppor... | {'CVE-2020-9491'} | 2022-04-29T20:33:29.094673Z | 2022-01-06T20:41:06Z | HIGH | null | {'CWE-327'} | {'https://nifi.apache.org/security#CVE-2020-9491', 'https://lists.apache.org/thread.html/r2d9c21f9ec35d66f2bb42f8abe876dabd786166b6284e9a33582c718@%3Ccommits.nifi.apache.org%3E', 'https://github.com/apache/nifi/commit/441781cec50f77d9f1e65093f55bbd614b8c5ec6', 'https://lists.apache.org/thread.html/re48582efe2ac973f8cff... | null | {'https://github.com/apache/nifi/commit/441781cec50f77d9f1e65093f55bbd614b8c5ec6'} | {'https://github.com/apache/nifi/commit/441781cec50f77d9f1e65093f55bbd614b8c5ec6'} |
Maven | GHSA-4w82-r329-3q67 | Deserialization of Untrusted Data in jackson-databind | FasterXML jackson-databind 2.x before 2.6.7.4, 2.7.x before 2.7.9.7, 2.8.x before 2.8.11.5 and 2.9.x before 2.9.10.2 lacks certain xbean-reflect/JNDI blocking, as demonstrated by org.apache.xbean.propertyeditor.JndiConverter. | {'CVE-2020-8840'} | 2022-04-07T22:46:58.349234Z | 2020-03-04T20:52:14Z | CRITICAL | null | {'CWE-502'} | {'https://lists.apache.org/thread.html/rdea588d4a0ebf9cb7ce8c3a8f18d0d306507c4f8ba178dd3d20207b8@%3Cdev.tomee.apache.org%3E', 'https://github.com/FasterXML/jackson-databind/commit/9bb52c7122271df75435ec7e66ecf6b02b1ee14f', 'https://lists.apache.org/thread.html/r9e59ebaf76fd00b2fa3ff5ebf18fe075ca9f4376216612c696f76718@%... | null | {'https://github.com/FasterXML/jackson-databind/commit/74aba4042fce35ee0b91bd2847e788c10040d78b', 'https://github.com/FasterXML/jackson-databind/commit/9bb52c7122271df75435ec7e66ecf6b02b1ee14f', 'https://github.com/FasterXML/jackson-databind/commit/914e7c9f2cb8ce66724bf26a72adc7e958992497'} | {'https://github.com/FasterXML/jackson-databind/commit/914e7c9f2cb8ce66724bf26a72adc7e958992497', 'https://github.com/FasterXML/jackson-databind/commit/9bb52c7122271df75435ec7e66ecf6b02b1ee14f', 'https://github.com/FasterXML/jackson-databind/commit/74aba4042fce35ee0b91bd2847e788c10040d78b'} |
Maven | GHSA-7r83-w6r8-fh6w | Reflected Cross-site Scripting (XSS) in ACS Commons | ACS Commons version 4.9.2 (and earlier) suffers from a Reflected Cross-site Scripting (XSS) vulnerability in version-compare and page-compare due to invalid JCR characters that are not handled correctly. An attacker could potentially exploit this vulnerability to inject malicious JavaScript content into vulnerable form... | {'CVE-2021-21043'} | 2022-03-03T05:13:58.536484Z | 2021-05-13T22:31:14Z | MODERATE | null | {'CWE-79', 'CWE-787'} | {'https://github.com/Adobe-Consulting-Services/acs-aem-commons/security/advisories/GHSA-f92j-qf46-p6vm', 'https://helpx.adobe.com/security/products/indesign/apsb21-22.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21043', 'https://github.com/Adobe-Consulting-Services/acs-aem-commons', 'https://github.com/Adobe-Consu... | null | {'https://github.com/Adobe-Consulting-Services/acs-aem-commons/commit/14d769c86606c4ce9a93c47a19f87e1ad72788d6'} | {'https://github.com/Adobe-Consulting-Services/acs-aem-commons/commit/14d769c86606c4ce9a93c47a19f87e1ad72788d6'} |
Maven | GHSA-q2xp-75m7-gv52 | Moderate severity vulnerability that affects net.sf.robocode:robocode.api | Robocode through 1.9.3.5 allows remote attackers to cause external service interaction (DNS), as demonstrated by a query for a unique subdomain name within an attacker-controlled DNS zone, because of a .openStream call within java.net.URL. | {'CVE-2019-10648'} | 2022-03-03T05:13:20.114776Z | 2019-04-02T15:36:49Z | CRITICAL | null | {'CWE-20', 'CWE-862'} | {'https://github.com/advisories/GHSA-q2xp-75m7-gv52', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10648', 'https://github.com/robo-code/robocode/commit/836c84635e982e74f2f2771b2c8640c3a34221bd#diff-0296a8f9d4a509789f4dc4f052d9c36f', 'https://sourceforge.net/p/robocode/bugs/406/'} | null | {'https://github.com/robo-code/robocode/commit/836c84635e982e74f2f2771b2c8640c3a34221bd#diff-0296a8f9d4a509789f4dc4f052d9c36f'} | {'https://github.com/robo-code/robocode/commit/836c84635e982e74f2f2771b2c8640c3a34221bd#diff-0296a8f9d4a509789f4dc4f052d9c36f'} |
Maven | GHSA-36hf-6hp2-9g4c | Local file inclusion allows unauthorized access to internal resources in Alkacon OpenCms | In Alkacon OpenCms 10.5.4 and 10.5.5, there are multiple resources vulnerable to Local File Inclusion that allow an attacker to access server resources: clearhistory.jsp, convertxml.jsp, group_new.jsp, loginmessage.jsp, xmlcontentrepair.jsp, and /system/workplace/admin/history/settings/index.jsp. | {'CVE-2019-13237'} | 2022-04-19T20:15:09.918154Z | 2019-11-12T22:58:14Z | MODERATE | null | {'CWE-200', 'CWE-22'} | {'http://packetstormsecurity.com/files/154281/Alkacon-OpenCMS-10.5.x-Local-File-Inclusion.html', 'https://github.com/alkacon/opencms-core/commits/branch_10_5_x', 'https://aetsu.github.io/OpenCms', 'https://nvd.nist.gov/vuln/detail/CVE-2019-13237', 'https://github.com/alkacon/opencms-core'} | null | {'https://github.com/alkacon/opencms-core/commits/branch_10_5_x'} | {'https://github.com/alkacon/opencms-core/commits/branch_10_5_x'} |
Maven | GHSA-2h3j-m7gr-25xj | Excessive Iteration Denial of Service in Apache PDFBox | A carefully crafted PDF file can trigger an infinite loop while loading the file. This issue affects Apache PDFBox version 2.0.22 and prior 2.0.x versions. | {'CVE-2021-27807'} | 2022-04-22T18:30:12.280832Z | 2021-06-16T17:56:46Z | MODERATE | null | {'CWE-834'} | {'https://lists.apache.org/thread.html/r4cbc3f6981cd0a1a482531df9d44e4c42a7f63342a7ba78b7bff8a1b@%3Cnotifications.james.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2021/03/19/9', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PT72QOFDXLJ7PLTN66EMG5EHPTE7... | null | {'https://github.com/apache/pdfbox/commit/5c5a837140fbb4ef78bb5ef9f29ad537c872c83e'} | {'https://github.com/apache/pdfbox/commit/5c5a837140fbb4ef78bb5ef9f29ad537c872c83e'} |
Maven | GHSA-hr32-mgpm-qf2f | Generation of Error Message Containing Sensitive Information in RESTEasy client | A flaw was found in RESTEasy client in all versions of RESTEasy up to 4.5.6.Final. It may allow client users to obtain the server's potentially sensitive information when the server got WebApplicationException from the RESTEasy client call. The highest threat from this vulnerability is to data confidentiality. | {'CVE-2020-25633'} | 2022-03-11T20:31:57.846588Z | 2021-06-03T23:41:34Z | MODERATE | null | {'CWE-209'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-25633', 'https://issues.redhat.com/browse/RESTEASY-2820', 'https://github.com/resteasy/Resteasy/pull/2665/commits/13c808b5967242eec1e877edbc0014a84dcd6eb0', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-25633'} | null | {'https://github.com/resteasy/Resteasy/pull/2665/commits/13c808b5967242eec1e877edbc0014a84dcd6eb0'} | {'https://github.com/resteasy/Resteasy/pull/2665/commits/13c808b5967242eec1e877edbc0014a84dcd6eb0'} |
Maven | GHSA-mh83-jcw5-rjh8 | XML External Entity Reference in edu.stanford.nlp:stanford-corenlp | The TransformXML() function makes use of SAXParser generated from a SAXParserFactory with no FEATURE_SECURE_PROCESSING set, allowing for XXE attacks. | {'CVE-2022-0198'} | 2022-03-03T05:13:04.921797Z | 2022-01-14T21:07:23Z | MODERATE | null | {'CWE-611'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0198', 'https://huntr.dev/bounties/3d7e70fe-dddd-4b79-af62-8e058c4d5763', 'https://github.com/stanfordnlp/corenlp/commit/1f52136321cfca68b991bd7870563d06cf96624d', 'https://github.com/stanfordnlp/corenlp/'} | null | {'https://github.com/stanfordnlp/corenlp/commit/1f52136321cfca68b991bd7870563d06cf96624d'} | {'https://github.com/stanfordnlp/corenlp/commit/1f52136321cfca68b991bd7870563d06cf96624d'} |
Maven | GHSA-2457-2263-mm9f | Memory leak in micronaut-core | ### Impact
Sending an invalid Content Type header leads to memory leak in `DefaultArgumentConversionContext` as this type is erroneously used in static state.
### Patches
The problem is patched in Micronaut 3.2.7 and above.
### Workarounds
The default content type binder can be replaced in an existing Micronaut ap... | {'CVE-2022-21700'} | 2022-03-03T05:11:18.519092Z | 2022-01-21T23:19:36Z | MODERATE | null | {'CWE-400'} | {'https://github.com/micronaut-projects/micronaut-core/', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21700', 'https://github.com/micronaut-projects/micronaut-core/commit/b8ec32c311689667c69ae7d9f9c3b3a8abc96fe3', 'https://github.com/micronaut-projects/micronaut-core/security/advisories/GHSA-2457-2263-mm9f'} | null | {'https://github.com/micronaut-projects/micronaut-core/commit/b8ec32c311689667c69ae7d9f9c3b3a8abc96fe3'} | {'https://github.com/micronaut-projects/micronaut-core/commit/b8ec32c311689667c69ae7d9f9c3b3a8abc96fe3'} |
Maven | GHSA-2mq8-99q7-55wx | Code injection in keycloak | A flaw was found in keycloak. The new account console in keycloak can allow malicious code to be executed using the referrer URL. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. | {'CVE-2021-20222'} | 2022-03-03T05:12:40.262840Z | 2021-05-13T22:29:51Z | HIGH | null | {'CWE-20'} | {'https://github.com/keycloak/keycloak/commit/3b80eee5bfdf2b80c47465c0f2eaf70074808741', 'https://bugzilla.redhat.com/show_bug.cgi?id=1924606', 'https://access.redhat.com/security/cve/cve-2021-20222', 'https://nvd.nist.gov/vuln/detail/CVE-2021-20222'} | null | {'https://github.com/keycloak/keycloak/commit/3b80eee5bfdf2b80c47465c0f2eaf70074808741'} | {'https://github.com/keycloak/keycloak/commit/3b80eee5bfdf2b80c47465c0f2eaf70074808741'} |
Maven | GHSA-v7wg-cpwc-24m4 | Unchecked Class Instantiation when providing Plugin Classes | pgjdbc instantiates plugin instances based on class names provided via `authenticationPluginClassName`, `sslhostnameverifier`, `socketFactory`, `sslfactory`, `sslpasswordcallback` connection properties. However, the driver did not verify if the class implements the expected interface before instantiating the class. The... | {'CVE-2022-21724'} | 2022-04-17T16:46:56.844044Z | 2022-02-02T00:04:20Z | HIGH | null | {'CWE-668', 'CWE-74', 'CWE-665'} | {'https://github.com/pgjdbc/pgjdbc/commit/f4d0ed69c0b3aae8531d83d6af4c57f22312c813', 'https://github.com/pgjdbc/pgjdbc/security/advisories/GHSA-v7wg-cpwc-24m4', 'https://security.netapp.com/advisory/ntap-20220311-0005/', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21724', 'https://lists.fedoraproject.org/archives/list/p... | null | {'https://github.com/pgjdbc/pgjdbc/commit/f4d0ed69c0b3aae8531d83d6af4c57f22312c813'} | {'https://github.com/pgjdbc/pgjdbc/commit/f4d0ed69c0b3aae8531d83d6af4c57f22312c813'} |
Maven | GHSA-jjhw-5mxp-2g2q | Cross-site Scripting in OpenNMS Horizon | In OpenNMS Horizon, versions opennms-1-0-stable through opennms-27.1.1; OpenNMS Meridian, versions meridian-foundation-2015.1.0-1 through meridian-foundation-2019.1.18-1; meridian-foundation-2020.1.0-1 through meridian-foundation-2020.1.6-1 are vulnerable to Stored Cross-Site Scripting, since the function `validateForm... | {'CVE-2021-25933'} | 2021-05-28T22:27:50Z | 2021-05-25T18:47:01Z | MODERATE | null | {'CWE-79'} | {'https://github.com/OpenNMS/opennms/commit/8a97e6869d6e49da18b208c837438ace80049c01,', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25933', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25933', 'https://github.com/OpenNMS/opennms/commit/f3ebfa3da5352b4d57f238b54c6db315ad99f10e', 'https://github.co... | null | {'https://github.com/OpenNMS/opennms/commit/eb08b5ed4c5548f3e941a1f0d0363ae4439fa98c', 'https://github.com/OpenNMS/opennms/commit/f3ebfa3da5352b4d57f238b54c6db315ad99f10e', 'https://github.com/OpenNMS/opennms/commit/8a97e6869d6e49da18b208c837438ace80049c01,'} | {'https://github.com/OpenNMS/opennms/commit/eb08b5ed4c5548f3e941a1f0d0363ae4439fa98c', 'https://github.com/OpenNMS/opennms/commit/8a97e6869d6e49da18b208c837438ace80049c01,', 'https://github.com/OpenNMS/opennms/commit/f3ebfa3da5352b4d57f238b54c6db315ad99f10e'} |
Maven | GHSA-9qcf-c26r-x5rf | XML external entity injection in Terracotta Quartz Scheduler | initDocumentParser in xml/XMLSchedulingDataProcessor.java in Terracotta Quartz Scheduler through 2.3.0 allows XXE attacks via a job description. | {'CVE-2019-13990'} | 2022-03-03T05:14:10.554139Z | 2020-07-01T17:55:03Z | CRITICAL | null | {'CWE-611'} | {'https://lists.apache.org/thread.html/1870324fea41ea68cff2fd1bf6ee2747432dc1d9d22a22cc681e0ec3@%3Cdev.tomee.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-13990', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.apache.org/thread.html/r21df13c8bd2c2eae4b9661aae814c4a2a814d1f7875c765... | null | {'https://github.com/quartz-scheduler/quartz/commit/13c1d45aa1db15d0fa0e4997139c99ba219be551'} | {'https://github.com/quartz-scheduler/quartz/commit/13c1d45aa1db15d0fa0e4997139c99ba219be551'} |
Maven | GHSA-88cc-g835-76rp | Improper Restriction of XML External Entity Reference | PostgreSQL JDBC Driver (aka PgJDBC) before 42.2.13 allows XXE. | {'CVE-2020-13692'} | 2022-03-03T05:13:49.071925Z | 2022-02-10T00:30:07Z | HIGH | null | {'CWE-611'} | {'https://lists.apache.org/thread.html/r0478a1aa9ae0dbd79d8f7b38d0d93fa933ac232e2b430b6f31a103c0@%3Ccommits.camel.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCCAPM6FSNOC272DLSNQ6YHXS3OMHGJC/', 'https://lists.apache.org/thread.html/r631f967db6260d61787... | null | {'https://github.com/pgjdbc/pgjdbc/commit/14b62aca4764d496813f55a43d050b017e01eb65'} | {'https://github.com/pgjdbc/pgjdbc/commit/14b62aca4764d496813f55a43d050b017e01eb65'} |
Maven | GHSA-mw36-7c6c-q4q2 | XStream can be used for Remote Code Execution | ### Impact
The vulnerability may allow a remote attacker to run arbitrary shell commands only by manipulating the processed input stream.
### Patches
If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.14.... | {'CVE-2020-26217'} | 2022-04-25T23:17:04.652412Z | 2020-11-16T20:07:59Z | HIGH | null | {'CWE-78'} | {'https://lists.apache.org/thread.html/redde3609b89b2a4ff18b536a06ef9a77deb93d47fda8ed28086fa8c3@%3Cissues.activemq.apache.org%3E', 'https://x-stream.github.io/CVE-2020-26217.html', 'https://github.com/x-stream/xstream', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/r2d... | null | {'https://github.com/x-stream/xstream/commit/0fec095d534126931c99fd38e9c6d41f5c685c1a'} | {'https://github.com/x-stream/xstream/commit/0fec095d534126931c99fd38e9c6d41f5c685c1a'} |
Maven | GHSA-8fp4-rp6c-5gcv | Path Traversal in com.linecorp.armeria:armeria | ### Impact
An attacker can access an Armeria server's local file system beyond its restricted directory by sending an HTTP request whose path contains `%2F` (encoded `/`), such as `/files/..%2Fsecrets.txt`, bypassing Armeria's path validation logic.
### Patches
Armeria 1.13.4 or above contains the hardened path vali... | {'CVE-2021-43795'} | 2022-03-03T05:13:34.204718Z | 2021-12-02T22:25:54Z | HIGH | null | {'CWE-22'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-43795', 'https://github.com/line/armeria', 'https://github.com/line/armeria/commit/e2697a575e9df6692b423e02d731f293c1313284', 'https://github.com/line/armeria/security/advisories/GHSA-8fp4-rp6c-5gcv', 'https://github.com/line/armeria/pull/3855'} | null | {'https://github.com/line/armeria/commit/e2697a575e9df6692b423e02d731f293c1313284'} | {'https://github.com/line/armeria/commit/e2697a575e9df6692b423e02d731f293c1313284'} |
Maven | GHSA-4vhj-98r6-424h | In Bouncy Castle JCE Provider it is possible to inject extra elements in the sequence making up the signature and still have it validate | In Bouncy Castle JCE Provider version 1.55 and earlier the DSA does not fully validate ASN.1 encoding of signature on verification. It is possible to inject extra elements in the sequence making up the signature and still have it validate, which in some cases may allow the introduction of 'invisible' data into a signed... | {'CVE-2016-1000338'} | 2022-04-27T13:30:13.955304Z | 2018-10-17T16:23:26Z | HIGH | null | {'CWE-347'} | {'https://github.com/advisories/GHSA-4vhj-98r6-424h', 'https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E', 'https://github.com/bcgit/bc-java/commit/b0c3ce99d43d73a096268831d0d120ffc89eac7f#diff-3679f5a9d2b939d0d3ee1601a7774fb0', 'https://gith... | null | {'https://github.com/bcgit/bc-java/commit/b0c3ce99d43d73a096268831d0d120ffc89eac7f#diff-3679f5a9d2b939d0d3ee1601a7774fb0'} | {'https://github.com/bcgit/bc-java/commit/b0c3ce99d43d73a096268831d0d120ffc89eac7f#diff-3679f5a9d2b939d0d3ee1601a7774fb0'} |
Maven | GHSA-grpf-gg7v-5g5h | SQL Injection in Apache SkyWalking | Only when using H2/MySQL/TiDB as Apache SkyWalking storage, there is a SQL injection vulnerability in the wildcard query cases. | {'CVE-2020-13921'} | 2022-03-03T05:13:44.746825Z | 2021-05-07T15:53:31Z | CRITICAL | null | {'CWE-89'} | {'https://github.com/apache/skywalking/pull/4970', 'https://github.com/apache/skywalking/commit/fb7912c6bdda06a233f4b3e18e71a87d3e4a8951', 'http://www.openwall.com/lists/oss-security/2020/08/05/3', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13921', 'https://lists.apache.org/thread.html/r6f3a934ebc54585d8468151a494c1919... | null | {'https://github.com/apache/skywalking/commit/fb7912c6bdda06a233f4b3e18e71a87d3e4a8951'} | {'https://github.com/apache/skywalking/commit/fb7912c6bdda06a233f4b3e18e71a87d3e4a8951'} |
Maven | GHSA-c265-37vj-cwcc | Deserialization of untrusted data in Jackson Databind | FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the interaction between serialization gadgets and typing, related to com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool (aka xalan2). | {'CVE-2020-14062'} | 2022-03-03T05:12:57.915830Z | 2020-06-18T14:44:48Z | HIGH | null | {'CWE-502'} | {'https://github.com/FasterXML/jackson-databind/issues/2704', 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062', 'https://lists.debian.org/debian-lts-announce/2020/07/msg00001.html', 'https://github.com/FasterXML/jackson-databind', 'https://snyk.io/vuln/SNYK-JAVA-C... | null | {'https://github.com/FasterXML/jackson-databind/commit/99001cdb6807b5c7b170ec6a9092ecbb618ae79c'} | {'https://github.com/FasterXML/jackson-databind/commit/99001cdb6807b5c7b170ec6a9092ecbb618ae79c'} |
Maven | GHSA-hwvm-vfw8-93mw | Vulnerable dependency in XTDB connector | ### Impact
The impacted portion of the XTDB connector is its connectivity to S3 as a backing store: this is the only portion of the connector that uses this vulnerable `httpclient` dependency. Per the description, the vulnerability regards URIs that may be misinterpreted, which given the area of impact within the conn... | null | 2022-03-03T05:13:41.782282Z | 2021-12-16T18:53:32Z | MODERATE | null | null | {'https://github.com/odpi/egeria-connector-xtdb/security/advisories/GHSA-hwvm-vfw8-93mw', 'https://github.com/odpi/egeria-connector-xtdb/commit/7b2dcc9fc6c5ce509cf72a275a2f2b8b1870dc15', 'https://github.com/odpi/egeria-connector-xtdb', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13956'} | null | {'https://github.com/odpi/egeria-connector-xtdb/commit/7b2dcc9fc6c5ce509cf72a275a2f2b8b1870dc15'} | {'https://github.com/odpi/egeria-connector-xtdb/commit/7b2dcc9fc6c5ce509cf72a275a2f2b8b1870dc15'} |
Maven | GHSA-2hjr-fg6c-v2h6 | Unauthorized access to Class instance in Jinjava | Jinjava before 2.5.4 allow access to arbitrary classes by calling Java methods on objects passed into a Jinjava context. This could allow for abuse of the application class loader, including Arbitrary File Disclosure. | {'CVE-2020-12668'} | 2022-03-03T05:13:11.121868Z | 2022-02-09T00:33:56Z | MODERATE | null | {'CWE-200'} | {'https://github.com/HubSpot/jinjava/pull/426/commits/5dfa5b87318744a4d020b66d5f7747acc36b213b', 'https://github.com/HubSpot/jinjava/compare/jinjava-2.5.3...jinjava-2.5.4', 'https://securitylab.github.com/advisories/GHSL-2020-072-hubspot_jinjava', 'https://github.com/HubSpot/jinjava/releases/tag/jinjava-2.5.4', 'https:... | null | {'https://github.com/HubSpot/jinjava/pull/426/commits/5dfa5b87318744a4d020b66d5f7747acc36b213b', 'https://github.com/HubSpot/jinjava/pull/435/commits/1b9aaa4b420c58b4a301cf4b7d26207f1c8d1165'} | {'https://github.com/HubSpot/jinjava/pull/435/commits/1b9aaa4b420c58b4a301cf4b7d26207f1c8d1165', 'https://github.com/HubSpot/jinjava/pull/426/commits/5dfa5b87318744a4d020b66d5f7747acc36b213b'} |
Maven | GHSA-w29m-fjp4-qhmq | Unsafe Identifiers in Opencast | ### Impact
Opencast allows almost arbitrary identifiers for media packages and
elements to be used. This can be problematic for operation and security
since such identifiers are sometimes used for file system operations
which may lead to an attacker being able to escape working directories and
write files to other loc... | {'CVE-2020-5230'} | 2022-03-03T05:13:16.934758Z | 2020-01-30T21:21:50Z | MODERATE | null | {'CWE-99'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-5230', 'https://github.com/opencast/opencast/security/advisories/GHSA-w29m-fjp4-qhmq', 'https://github.com/opencast/opencast/commit/bbb473f34ab95497d6c432c81285efb0c739f317'} | null | {'https://github.com/opencast/opencast/commit/bbb473f34ab95497d6c432c81285efb0c739f317'} | {'https://github.com/opencast/opencast/commit/bbb473f34ab95497d6c432c81285efb0c739f317'} |
Maven | GHSA-h353-hc43-95vc | Script injection without script or programming rights through Gadget titles | ### Impact
A user without Script or Programming right is able to execute script requiring privileges by editing gadget titles in the dashboard.
### Patches
The issue has been patched in XWiki 12.6.7, 12.10.3 and 13.0RC1.
### Workarounds
There's no easy workaround for this issue, it is recommended to upgrade XWiki.
#... | {'CVE-2021-32621'} | 2022-03-03T05:14:13.346640Z | 2021-05-18T18:36:16Z | HIGH | null | {'CWE-94'} | {'https://jay-from-future.github.io/cve/2021/06/17/xwiki-rce-cve.html', 'https://jira.xwiki.org/browse/XWIKI-17794', 'https://github.com/xwiki/xwiki-platform/commit/bb7068bd911f91e5511f3cfb03276c7ac81100bc', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32621', 'https://github.com/xwiki/xwiki-platform/security/advisories/... | null | {'https://github.com/xwiki/xwiki-platform/commit/bb7068bd911f91e5511f3cfb03276c7ac81100bc'} | {'https://github.com/xwiki/xwiki-platform/commit/bb7068bd911f91e5511f3cfb03276c7ac81100bc'} |
Maven | GHSA-w285-wf9q-5w69 | In Bouncy Castle JCE Provider the ECIES implementation allowed the use of ECB mode | In the Bouncy Castle JCE Provider version 1.55 and earlier the ECIES implementation allowed the use of ECB mode. This mode is regarded as unsafe and support for it has been removed from the provider. | {'CVE-2016-1000352'} | 2022-04-27T13:45:07.939306Z | 2018-10-17T16:27:38Z | HIGH | null | {'CWE-326'} | {'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://access.redhat.com/errata/RHSA-2018:2669', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000352', 'https://github.com/bcgit/bc-java', 'https://security.netapp.com/advisory/ntap-20181127-0004/', 'https://github.com/advisories/GHSA-w285-wf9q-5w69', 'https:/... | null | {'https://github.com/bcgit/bc-java/commit/9385b0ebd277724b167fe1d1456e3c112112be1f'} | {'https://github.com/bcgit/bc-java/commit/9385b0ebd277724b167fe1d1456e3c112112be1f'} |
Maven | GHSA-jj4f-p7vv-j4v9 | Arbitrary code execution in Apache Druid | Apache Druid allows users to read data from other database systems using JDBC. This functionality is to allow trusted users with the proper permissions to set up lookups or submit ingestion tasks. The MySQL JDBC driver supports certain properties, which, if left unmitigated, can allow an attacker to execute arbitrary c... | {'CVE-2021-26919'} | 2022-03-03T05:14:09.525699Z | 2021-06-16T17:51:58Z | HIGH | null | {'CWE-668'} | {'https://lists.apache.org/thread.html/rd87451fce34df54796e66321c40d743a68fb4553d72e7f6f0bc62ebd%40%3Cdev.druid.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-26919', 'https://lists.apache.org/thread.html/r7a531ec123570cb7875ff991cf115f99e9ef99a48b3cf3fa4f9d9864@%3Ccommits.druid.apache.org%3E', 'https://git... | null | {'https://github.com/apache/druid/commit/48953e3508967f5156c69676432b5d4dd25ea678'} | {'https://github.com/apache/druid/commit/48953e3508967f5156c69676432b5d4dd25ea678'} |
Maven | GHSA-2pqj-h3vj-pqgw | Cross-Site Scripting in jquery | Affected versions of `jquery` are vulnerable to cross-site scripting. This occurs because the main `jquery` function uses a regular expression to differentiate between HTML and selectors, but does not properly anchor the regular expression. The result is that `jquery` may interpret HTML as selectors when given certain ... | {'CVE-2012-6708'} | 2022-03-03T05:13:33.982770Z | 2020-09-01T16:41:46Z | HIGH | null | {'CWE-64', 'CWE-79'} | {'http://packetstormsecurity.com/files/161972/Linksys-EA7500-2.0.8.194281-Cross-Site-Scripting.html', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://github.com/jquery/jquery/commit/05531fc4080ae24070930d15ae0cea7ae056457d', 'https://l... | null | {'https://github.com/jquery/jquery/commit/05531fc4080ae24070930d15ae0cea7ae056457d'} | {'https://github.com/jquery/jquery/commit/05531fc4080ae24070930d15ae0cea7ae056457d'} |
Maven | GHSA-75p6-52g3-rqc8 | Privilege escalation vulnerability on Token Exchange feature | A privilege escalation flaw was found in the token exchange feature of keycloak. Missing authorization allows a client application holding a valid access token to exchange tokens for any target client by passing the client_id of the target. This could allow a client to gain unauthorized access to additional services. | {'CVE-2022-1245'} | 2022-05-02T20:02:19.743635Z | 2022-04-26T21:21:00Z | MODERATE | null | {'CWE-284'} | {'https://github.com/keycloak/keycloak/security/advisories/GHSA-75p6-52g3-rqc8', 'https://github.com/keycloak/keycloak', 'https://github.com/keycloak/keycloak/commit/76d83f46fad94ebcbedaa49e6daad458e2894e52'} | null | {'https://github.com/keycloak/keycloak/commit/76d83f46fad94ebcbedaa49e6daad458e2894e52'} | {'https://github.com/keycloak/keycloak/commit/76d83f46fad94ebcbedaa49e6daad458e2894e52'} |
Maven | GHSA-378p-hrq3-x4p3 | Cross-site scripting in Shopizer | A reflected cross-site scripting (XSS) vulnerability in Shopizer before 2.17.0 allows remote attackers to inject arbitrary web script or HTML via the ref parameter to a page about an arbitrary product, e.g., a product/insert-product-name-here.html/ref= URL. | {'CVE-2021-33562'} | 2022-03-03T05:13:53.531451Z | 2021-06-08T23:08:20Z | MODERATE | null | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-33562', 'https://www.exploit-db.com/exploits/49901', 'https://github.com/shopizer-ecommerce/shopizer/compare/2.16.0...2.17.0', 'https://github.com/shopizer-ecommerce/shopizer/commit/197f8c78c8f673b957e41ca2c823afc654c19271'} | null | {'https://github.com/shopizer-ecommerce/shopizer/commit/197f8c78c8f673b957e41ca2c823afc654c19271'} | {'https://github.com/shopizer-ecommerce/shopizer/commit/197f8c78c8f673b957e41ca2c823afc654c19271'} |
Maven | GHSA-35fg-hjcr-j65f | Information exposure in xwiki-platform | ### Impact
It's possible to guess if a user has an account on the wiki by using the "Forgot your password" form, even if the wiki is closed to guest users.
### Patches
The problem has been patched on XWiki 12.10.9, 13.4.1 and 13.6RC1.
### Workarounds
There's no easy workaround other than applying the upgrade.
### Re... | {'CVE-2022-23619'} | 2022-02-09T21:51:19Z | 2022-02-09T21:51:19Z | MODERATE | null | {'CWE-200', 'CWE-640'} | {'https://github.com/xwiki/xwiki-platform', 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-35fg-hjcr-j65f', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23619', 'https://jira.xwiki.org/browse/XWIKI-18787', 'https://github.com/xwiki/xwiki-platform/commit/d8a3cce48e0ac1a0f4a3cea7a19747382d9c9494'} | null | {'https://github.com/xwiki/xwiki-platform/commit/d8a3cce48e0ac1a0f4a3cea7a19747382d9c9494'} | {'https://github.com/xwiki/xwiki-platform/commit/d8a3cce48e0ac1a0f4a3cea7a19747382d9c9494'} |
Maven | GHSA-cghx-9gcr-r42x | Path Traversal in the Java Kubernetes Client | Kubernetes Java client libraries in version 10.0.0 and versions prior to 9.0.1 allow writes to paths outside of the current directory when copying multiple files from a remote pod which sends a maliciously crafted archive. This can potentially overwrite any files on the system of the process executing the client code. | {'CVE-2020-8570'} | 2022-03-03T05:13:41.235117Z | 2021-01-29T18:12:54Z | MODERATE | null | {'CWE-22'} | {'https://groups.google.com/g/kubernetes-security-announce/c/sd5h73sFPrg', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8570', 'https://lists.apache.org/thread.html/r0c76b3d0be348f788cd947054141de0229af00c540564711e828fd40@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rdb223e1b82e3d7d8e4eaddce8dd... | null | {'https://github.com/kubernetes-client/java/commit/858316ae8bc1145005a0310e1f65f95d2389a589'} | {'https://github.com/kubernetes-client/java/commit/858316ae8bc1145005a0310e1f65f95d2389a589'} |
Maven | GHSA-7rpj-hg47-cx62 | Improper Restriction of XML External Entity Reference in com.h2database:h2. | H2 is an embeddable RDBMS written in Java. The package com.h2database:h2 from 0 and before 2.0.202 are vulnerable to XML External Entity (XXE) Injection via the org.h2.jdbc.JdbcSQLXML class object, when it receives parsed string data from org.h2.jdbc.JdbcResultSet.getSQLXML() method. If it executes the getSource() meth... | {'CVE-2021-23463'} | 2022-04-22T15:47:00.309584Z | 2021-12-16T14:29:57Z | HIGH | null | {'CWE-611'} | {'https://github.com/h2database/h2database/pull/3199', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://snyk.io/vuln/SNYK-JAVA-COMH2DATABASE-1769238', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23463', 'https://github.com/h2database/h2database/issues/3195', 'https://github.com/h2database/h2database/',... | null | {'https://github.com/h2database/h2database/commit/d83285fd2e48fb075780ee95badee6f5a15ea7f8#diff-008c2e4462609982199cd83e7cf6f1d6b41296b516783f6752c44b9f15dc7bc3'} | {'https://github.com/h2database/h2database/commit/d83285fd2e48fb075780ee95badee6f5a15ea7f8#diff-008c2e4462609982199cd83e7cf6f1d6b41296b516783f6752c44b9f15dc7bc3'} |
Maven | GHSA-8rf5-92jh-3vc9 | Uncaught Exception leading to Denial of Service in json-sanitizer | OWASP json-sanitizer before 1.2.2 can output invalid JSON or throw an undeclared exception for crafted input. This may lead to denial of service if the application is not prepared to handle these situations. | {'CVE-2021-23900'} | 2022-03-03T05:12:57.380645Z | 2021-05-13T22:31:32Z | HIGH | null | {'CWE-248'} | {'https://github.com/OWASP/json-sanitizer/commit/a37f594f7378a1c76b3283e0dab9e1ab1dc0247e', 'https://github.com/OWASP/json-sanitizer/compare/v1.2.1...v1.2.2', 'https://groups.google.com/g/json-sanitizer-support/c/dAW1AeNMoA0', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23900'} | null | {'https://github.com/OWASP/json-sanitizer/commit/a37f594f7378a1c76b3283e0dab9e1ab1dc0247e'} | {'https://github.com/OWASP/json-sanitizer/commit/a37f594f7378a1c76b3283e0dab9e1ab1dc0247e'} |
Maven | GHSA-6x3v-rw2q-9gx7 | Improper implementation of the session fixation protection in Infinispan | A flaw was found in Infinispan through version 9.4.14.Final. An improper implementation of the session fixation protection in the Spring Session integration can result in incorrect session handling. | {'CVE-2019-10158'} | 2022-03-03T05:12:57.542880Z | 2020-01-21T21:18:44Z | CRITICAL | null | {'CWE-384'} | {'https://github.com/infinispan/infinispan/commit/4b381c5910265972ccaabefbdbd16a2b929f6b72', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10158', 'https://github.com/infinispan/infinispan/pull/7025', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10158', 'https://github.com/infinispan/infinispan/pull/6960'} | null | {'https://github.com/infinispan/infinispan/commit/4b381c5910265972ccaabefbdbd16a2b929f6b72'} | {'https://github.com/infinispan/infinispan/commit/4b381c5910265972ccaabefbdbd16a2b929f6b72'} |
Maven | GHSA-jc7r-v6fg-2gpf | High severity vulnerability that affects org.apache.cxf:apache-cxf, org.apache.cxf:apache-cxf , and org.apache.cxf:cxf | It is possible to configure Apache CXF to use the com.sun.net.ssl implementation via 'System.setProperty("java.protocol.handler.pkgs", "com.sun.net.ssl.internal.www.protocol");'. When this system property is set, CXF uses some reflection to try to make the HostnameVerifier work with the old com.sun.net.ssl.HostnameVeri... | {'CVE-2018-8039'} | 2022-03-03T05:13:29.834590Z | 2018-10-19T16:40:01Z | HIGH | null | {'CWE-755'} | {'http://www.securityfocus.com/bid/106357', 'https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf@%3Ccommits.cxf.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:2276', 'https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c@%3... | null | {'https://github.com/apache/cxf/commit/fae6fabf9bd7647f5e9cb68897a7d72b545b741b'} | {'https://github.com/apache/cxf/commit/fae6fabf9bd7647f5e9cb68897a7d72b545b741b'} |
Maven | GHSA-vh5c-jqfg-mhrh | Cross-Site Request Forgery in xwiki-platform | ### Impact
It's possible to know if a user has or not an account in a wiki related to an email address, and which username(s) is actually tight to that email by forging a request to the Forgot username page. Note that since this page does not have a CSRF check it's quite easy to perform a lot of those requests.
### Pa... | {'CVE-2021-32732'} | 2022-02-11T21:08:09Z | 2022-02-10T22:42:46Z | HIGH | null | {'CWE-352'} | {'https://jira.xwiki.org/browse/XWIKI-18408', 'https://github.com/xwiki/xwiki-platform/', 'https://github.com/xwiki/xwiki-platform/commit/f0440dfcbba705e03f7565cd88893dde57ca3fa8', 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-vh5c-jqfg-mhrh', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32732', 'http... | null | {'https://github.com/xwiki/xwiki-platform/commit/69548c0320cbd772540cf4668743e69f879812cf', 'https://github.com/xwiki/xwiki-platform/commit/f0440dfcbba705e03f7565cd88893dde57ca3fa8'} | {'https://github.com/xwiki/xwiki-platform/commit/69548c0320cbd772540cf4668743e69f879812cf', 'https://github.com/xwiki/xwiki-platform/commit/f0440dfcbba705e03f7565cd88893dde57ca3fa8'} |
Maven | GHSA-ghq2-m3pq-qf3p | Stored XSS in Jenkins CVS Plugin | Jenkins CVS Plugin 2.19 and earlier does not escape the name and description of CVS Symbolic Name parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. | {'CVE-2022-29037'} | 2022-05-03T21:07:01.626408Z | 2022-04-13T00:00:18Z | MODERATE | null | {'CWE-79'} | {'https://github.com/jenkinsci/cvs-plugin/commit/043ef8801a7b3fbbf778245c3c7174d21e42efe2', 'https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2617', 'https://github.com/jenkinsci/cvs-plugin', 'https://nvd.nist.gov/vuln/detail/CVE-2022-29037'} | null | {'https://github.com/jenkinsci/cvs-plugin/commit/043ef8801a7b3fbbf778245c3c7174d21e42efe2'} | {'https://github.com/jenkinsci/cvs-plugin/commit/043ef8801a7b3fbbf778245c3c7174d21e42efe2'} |
Maven | GHSA-xmw9-q7x9-j5qc | Unbounded connection acceptance leads to file handle exhaustion | ### Impact
All servers running blaze-core <= 0.14.14, including blaze-http and http4s-blaze-server users, are affected.
Blaze, accepts connections unconditionally on a dedicated thread pool. This has the net effect of amplifying degradation in services that are unable to handle their current request load, since incom... | {'CVE-2021-21293'} | 2022-03-03T05:09:41.293433Z | 2021-02-02T21:42:49Z | HIGH | null | {'CWE-400'} | {'https://github.com/http4s/blaze/commit/4f786177f9fb71ab272f3a5f6c80bca3e5662aa1', 'https://github.com/http4s/blaze/security/advisories/GHSA-xmw9-q7x9-j5qc', 'https://github.com/http4s/http4s/security/advisories/GHSA-xhv5-w9c5-2r2w', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21293'} | null | {'https://github.com/http4s/blaze/commit/4f786177f9fb71ab272f3a5f6c80bca3e5662aa1'} | {'https://github.com/http4s/blaze/commit/4f786177f9fb71ab272f3a5f6c80bca3e5662aa1'} |
Maven | GHSA-vwpg-f6gw-rjvf | Incorrect Authorization in Spring Cloud Netflix Zuul | Applications using the “Sensitive Headers” functionality in Spring Cloud Netflix Zuul 2.2.6.RELEASE and below may be vulnerable to bypassing the “Sensitive Headers” restriction when executing requests with specially constructed URLs. Applications that use Spring Security's StrictHttpFirewall (enabled by default for all... | {'CVE-2021-22113'} | 2022-03-03T05:12:50.802161Z | 2021-05-10T15:18:50Z | MODERATE | null | {'CWE-863'} | {'https://tanzu.vmware.com/security/cve-2021-22113', 'https://github.com/spring-cloud/spring-cloud-netflix/commit/8ecb3dca511c3ce0454e42ac31ee2331d7318c07', 'https://nvd.nist.gov/vuln/detail/CVE-2021-22113'} | null | {'https://github.com/spring-cloud/spring-cloud-netflix/commit/8ecb3dca511c3ce0454e42ac31ee2331d7318c07'} | {'https://github.com/spring-cloud/spring-cloud-netflix/commit/8ecb3dca511c3ce0454e42ac31ee2331d7318c07'} |
Maven | GHSA-h77f-xxx7-4858 | User impersonation due to incorrect handling of the login JWT | ### Impact
<!--_What kind of vulnerability is it? Who is impacted?_-->
This allows anyone that can connect to the server to forge a LoginPacket with manipulated JWT token allowing impersonation as any Bedrock user. Unless credentials are saved in your configuration, online mode is not affected as users are still requir... | {'CVE-2021-39177'} | 2021-09-07T14:04:02Z | 2021-09-07T23:04:04Z | HIGH | null | {'CWE-287'} | {'https://github.com/GeyserMC/Geyser/commit/b9541505af68ac7b7c093206ac7b1ba88957a5a6', 'https://github.com/GeyserMC/Geyser', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39177', 'https://updates.playhive.com/weekend-maintenance-disclosure-2kJMaY', 'https://github.com/GeyserMC/Geyser/security/advisories/GHSA-h77f-xxx7-485... | null | {'https://github.com/GeyserMC/Geyser/commit/b9541505af68ac7b7c093206ac7b1ba88957a5a6'} | {'https://github.com/GeyserMC/Geyser/commit/b9541505af68ac7b7c093206ac7b1ba88957a5a6'} |
Maven | GHSA-xhv5-w9c5-2r2w | Unbounded connection acceptance in http4s-blaze-server | ### Impact
blaze-core, a library underlying http4s-blaze-server, accepts connections unboundedly on its selector pool. This has the net effect of amplifying degradation in services that are unable to handle their current request load, since incoming connections are still accepted and added to an unbounded queue. Each ... | {'CVE-2021-21294'} | 2022-03-03T05:13:53.464823Z | 2021-02-02T21:42:56Z | HIGH | null | {'CWE-400'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-21294', 'https://github.com/http4s/blaze/security/advisories/GHSA-xmw9-q7x9-j5qc', 'https://github.com/http4s/http4s/commit/987d6589ef79545b9bb2324ac4bdebf82d9a0171', 'https://github.com/http4s/http4s/security/advisories/GHSA-xhv5-w9c5-2r2w'} | null | {'https://github.com/http4s/http4s/commit/987d6589ef79545b9bb2324ac4bdebf82d9a0171'} | {'https://github.com/http4s/http4s/commit/987d6589ef79545b9bb2324ac4bdebf82d9a0171'} |
Maven | GHSA-4rm3-4mq4-mfwr | Moderate severity vulnerability that affects org.hswebframework.web:hsweb-commons | A CSRF issue was discovered in web/authorization/oauth2/controller/OAuth2ClientController.java in hsweb 3.0.4 because the state parameter in the request is not compared with the state parameter in the session after user authentication is successful. | {'CVE-2018-20595'} | 2022-03-03T05:13:34.121093Z | 2019-01-04T17:43:22Z | HIGH | null | {'CWE-352'} | {'https://github.com/advisories/GHSA-4rm3-4mq4-mfwr', 'https://github.com/hs-web/hsweb-framework/issues/107', 'https://github.com/hs-web/hsweb-framework/commit/40929e9b0d336a26281a5ed2e0e721d54dd8d2f2', 'https://github.com/hs-web/hsweb-framework', 'https://nvd.nist.gov/vuln/detail/CVE-2018-20595'} | null | {'https://github.com/hs-web/hsweb-framework/commit/40929e9b0d336a26281a5ed2e0e721d54dd8d2f2'} | {'https://github.com/hs-web/hsweb-framework/commit/40929e9b0d336a26281a5ed2e0e721d54dd8d2f2'} |
Maven | GHSA-5vcm-3xc3-w7x3 | Response Splitting from unsanitized headers | ### Impact
http4s is vulnerable to response-splitting or request-splitting attacks when untrusted user input is used to create any of the following fields:
* Header names (`Header.name`å
* Header values (`Header.value`)
* Status reason phrases (`Status.reason`)
* URI paths (`Uri.Path`)
* URI authority registered name... | {'CVE-2021-41084'} | 2021-10-21T14:31:24Z | 2021-09-22T19:18:41Z | HIGH | null | {'CWE-918'} | {'https://httpwg.org/http-core/draft-ietf-httpbis-semantics-latest.html#fields.values', 'https://owasp.org/www-community/attacks/HTTP_Response_Splitting', 'https://github.com/http4s/http4s/security/advisories/GHSA-5vcm-3xc3-w7x3', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41084', 'https://github.com/http4s/http4s', 'h... | null | {'https://github.com/http4s/http4s/commit/d02007db1da4f8f3df2dbf11f1db9ac7afc3f9d8'} | {'https://github.com/http4s/http4s/commit/d02007db1da4f8f3df2dbf11f1db9ac7afc3f9d8'} |
Maven | GHSA-334p-wv2m-w3vp | Denial of service in Apache Xerces2 | XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the C... | {'CVE-2009-2625'} | 2022-03-03T05:13:12.578512Z | 2020-06-15T18:51:30Z | MODERATE | null | null | {'http://www.mandriva.com/security/advisories?name=MDVSA-2011:108', 'http://www.ubuntu.com/usn/USN-890-1', 'http://www.vmware.com/security/advisories/VMSA-2009-0016.html', 'http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html', 'http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.h... | null | {'https://github.com/apache/xerces2-j/commit/0bdf77af1d4fd26ec2e630fb6d12e2dfa77bc12b'} | {'https://github.com/apache/xerces2-j/commit/0bdf77af1d4fd26ec2e630fb6d12e2dfa77bc12b'} |
NuGet | GHSA-h6wf-hvwc-fm77 | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0915, CVE-2019-0916, CVE-2019-0917, CVE-2019-0922, CVE-20... | {'CVE-2019-0914'} | 2022-03-03T05:13:51.386230Z | 2021-03-29T21:00:02Z | HIGH | null | {'CWE-787'} | {'https://github.com/chakra-core/ChakraCore/commit/d85b5025b047f10784c53c6c1dd771775d417f5f', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0914', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0914'} | null | {'https://github.com/chakra-core/ChakraCore/commit/d85b5025b047f10784c53c6c1dd771775d417f5f', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'} | {'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://github.com/chakra-core/ChakraCore/commit/d85b5025b047f10784c53c6c1dd771775d417f5f'} |
NuGet | GHSA-4jqc-8m5r-9rpr | Prototype Pollution in set-value | This affects the package `set-value` before 2.0.1, and starting with 3.0.0 but prior to 4.0.1. A type confusion vulnerability can lead to a bypass of CVE-2019-10747 when the user-provided keys used in the path parameter are arrays. | {'CVE-2021-23440'} | 2022-03-30T21:18:05Z | 2021-09-13T20:09:36Z | HIGH | null | {'CWE-843', 'CWE-1321'} | {'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1584212', 'https://snyk.io/vuln/SNYK-JS-SETVALUE-1540541', 'https://github.com/jonschlinkert/set-value', 'https://github.com/jonschlinkert/set-value/pull/33', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23440', 'http... | null | {'https://github.com/jonschlinkert/set-value/commit/7cf8073bb06bf0c15e08475f9f952823b4576452'} | {'https://github.com/jonschlinkert/set-value/commit/7cf8073bb06bf0c15e08475f9f952823b4576452'} |
NuGet | GHSA-w32p-76xr-88pc | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0989, CVE-2019-0991, CVE-2019-0992, CVE-2019-0993, CVE-2019-1002, CVE-2019-1024, CVE-20... | {'CVE-2019-1003'} | 2022-03-03T05:13:43.169665Z | 2021-03-29T20:59:06Z | HIGH | null | {'CWE-787'} | {'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1003', 'https://github.com/chakra-core/ChakraCore/commit/90f67afac6362828c750f3bccbcc1c360caf29e4', 'https://github.com/chakra-core/ChakraCore/commit/3d6226cc2d1077537220361c82e34a362c6c76ee', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1003'} | null | {'https://github.com/chakra-core/ChakraCore/commit/90f67afac6362828c750f3bccbcc1c360caf29e4', 'https://github.com/chakra-core/ChakraCore/commit/3d6226cc2d1077537220361c82e34a362c6c76ee'} | {'https://github.com/chakra-core/ChakraCore/commit/3d6226cc2d1077537220361c82e34a362c6c76ee', 'https://github.com/chakra-core/ChakraCore/commit/90f67afac6362828c750f3bccbcc1c360caf29e4'} |
NuGet | GHSA-hfm2-fffh-v47v | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1131, CVE-2019-1139, CVE-2019-1140, CVE-2019-1141, CVE-2019-1195, CVE-2019-1197. | {'CVE-2019-1196'} | 2022-03-03T05:14:19.261008Z | 2021-03-29T20:58:01Z | HIGH | null | {'CWE-787'} | {'https://github.com/chakra-core/ChakraCore/commit/6b1250b6ffea7006226dd937e52cf5b353fcfc15', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1196', 'https://github.com/chakra-core/ChakraCore/commit/dce7443ae45f82eceec3284974610e1a1bbe6792', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1196'} | null | {'https://github.com/chakra-core/ChakraCore/commit/dce7443ae45f82eceec3284974610e1a1bbe6792', 'https://github.com/chakra-core/ChakraCore/commit/6b1250b6ffea7006226dd937e52cf5b353fcfc15'} | {'https://github.com/chakra-core/ChakraCore/commit/dce7443ae45f82eceec3284974610e1a1bbe6792', 'https://github.com/chakra-core/ChakraCore/commit/6b1250b6ffea7006226dd937e52cf5b353fcfc15'} |
NuGet | GHSA-gr4c-5rq6-cgh3 | OPC UA applications can allow a remote attacker to determine a Server's private key | An issue was discovered in OPC UA .NET Standard Stack and Sample Code before GitHub commit 2018-04-12, and OPC UA .NET Legacy Stack and Sample Code before GitHub commit 2018-03-13. A vulnerability in OPC UA applications can allow a remote attacker to determine a Server's private key by sending carefully constructed bad... | {'CVE-2018-7559'} | 2022-04-26T19:15:37.218627Z | 2018-10-16T19:58:42Z | MODERATE | null | null | {'https://github.com/OPCFoundation/UA-.NETStandard/commit/ebcf026a54dd0c9052cff009d96d827ac923d150', 'https://github.com/OPCFoundation/UA-.NET-Legacy/commit/e2a781b38efb8686d2bd850c2f2372b5c670bc45', 'http://www.securityfocus.com/bid/108688', 'https://github.com/OPCFoundation/UA-.NETStandard', 'https://nvd.nist.gov/vul... | null | {'https://github.com/OPCFoundation/UA-.NET-Legacy/commit/e2a781b38efb8686d2bd850c2f2372b5c670bc45', 'https://github.com/OPCFoundation/UA-.NETStandard/commit/ebcf026a54dd0c9052cff009d96d827ac923d150'} | {'https://github.com/OPCFoundation/UA-.NETStandard/commit/ebcf026a54dd0c9052cff009d96d827ac923d150', 'https://github.com/OPCFoundation/UA-.NET-Legacy/commit/e2a781b38efb8686d2bd850c2f2372b5c670bc45'} |
NuGet | GHSA-8xc6-g8xw-h2c4 | YARP Denial of Service Vulnerability | ### Impact
A denial of service vulnerability exists in how YARP processes input.
### Patches
If you're using YARP `1.0.0`, you should update to NuGet package version [`1.0.1`](https://www.nuget.org/packages/Yarp.ReverseProxy/1.0.1).
If you're using YARP `1.1.0-RC.1`, you should update to NuGet package version [`1.1.... | {'CVE-2022-26924'} | 2022-05-03T17:46:54.173769Z | 2022-04-22T20:23:44Z | HIGH | null | null | {'https://github.com/microsoft/reverse-proxy/commit/11e6272da17beb03d0b44a19d3c4f1ffa52b7c38', 'https://nvd.nist.gov/vuln/detail/CVE-2022-26924', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-26924', 'https://github.com/microsoft/reverse-proxy', 'https://github.com/microsoft/reverse-proxy... | null | {'https://github.com/microsoft/reverse-proxy/commit/11e6272da17beb03d0b44a19d3c4f1ffa52b7c38'} | {'https://github.com/microsoft/reverse-proxy/commit/11e6272da17beb03d0b44a19d3c4f1ffa52b7c38'} |
NuGet | GHSA-ppq7-88c7-q879 | Cross-Site Request Forgery in PiranhaCMS | In PiranhaCMS, versions 4.0.0-alpha1 to 9.2.0 are vulnerable to cross-site request forgery (CSRF) when performing various actions supported by the management system, such as deleting a user, deleting a role, editing a post, deleting a media folder etc., when an ID is known. | {'CVE-2021-25976'} | 2022-03-03T05:13:18.933077Z | 2021-11-17T23:42:40Z | HIGH | null | {'CWE-352'} | {'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25976', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25976', 'https://github.com/PiranhaCMS/piranha.core/commit/e42abacdd0dd880ce9cf6607efcc24646ac82eda', 'https://github.com/PiranhaCMS/piranha.core'} | null | {'https://github.com/PiranhaCMS/piranha.core/commit/e42abacdd0dd880ce9cf6607efcc24646ac82eda'} | {'https://github.com/PiranhaCMS/piranha.core/commit/e42abacdd0dd880ce9cf6607efcc24646ac82eda'} |
NuGet | GHSA-cwp9-956f-vcwh | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1131, CVE-2019-1139, CVE-2019-1140, CVE-2019-1195, CVE-2019-1196, CVE-2019-1197. | {'CVE-2019-1141'} | 2022-03-03T05:14:03.020055Z | 2021-03-29T20:57:56Z | HIGH | null | {'CWE-787'} | {'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1141', 'https://github.com/chakra-core/ChakraCore/commit/6b1250b6ffea7006226dd937e52cf5b353fcfc15', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1141', 'https://github.com/chakra-core/ChakraCore/commit/329d9d213e7b286349c0b156be4b5a088555de90'} | null | {'https://github.com/chakra-core/ChakraCore/commit/329d9d213e7b286349c0b156be4b5a088555de90', 'https://github.com/chakra-core/ChakraCore/commit/6b1250b6ffea7006226dd937e52cf5b353fcfc15'} | {'https://github.com/chakra-core/ChakraCore/commit/329d9d213e7b286349c0b156be4b5a088555de90', 'https://github.com/chakra-core/ChakraCore/commit/6b1250b6ffea7006226dd937e52cf5b353fcfc15'} |
NuGet | GHSA-37pf-w9ff-gqvm | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0917, CVE-20... | {'CVE-2019-0927'} | 2022-03-03T05:12:47.095852Z | 2021-03-29T20:58:59Z | HIGH | null | {'CWE-787'} | {'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0927', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0927', 'https://github.com/chakra-core/ChakraCore/commit/87ac2b5a751710ee288fdda3fd4d9818e22387a1'} | null | {'https://github.com/chakra-core/ChakraCore/commit/87ac2b5a751710ee288fdda3fd4d9818e22387a1', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'} | {'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://github.com/chakra-core/ChakraCore/commit/87ac2b5a751710ee288fdda3fd4d9818e22387a1'} |
NuGet | GHSA-vmf5-924f-25f2 | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1062, CVE-2019-1092, CVE-2019-1106, CVE-2019-1107. | {'CVE-2019-1103'} | 2022-03-03T05:13:55.062872Z | 2021-03-29T20:59:12Z | HIGH | null | {'CWE-787'} | {'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1103', 'https://github.com/chakra-core/ChakraCore/commit/75162b7f2d8ac2b37d17564e9c979ba1bae707e8', 'https://github.com/chakra-core/ChakraCore/commit/efab3101028045cbfa0cc21bd852f75bcc037dba', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1103'} | null | {'https://github.com/chakra-core/ChakraCore/commit/75162b7f2d8ac2b37d17564e9c979ba1bae707e8', 'https://github.com/chakra-core/ChakraCore/commit/efab3101028045cbfa0cc21bd852f75bcc037dba'} | {'https://github.com/chakra-core/ChakraCore/commit/efab3101028045cbfa0cc21bd852f75bcc037dba', 'https://github.com/chakra-core/ChakraCore/commit/75162b7f2d8ac2b37d17564e9c979ba1bae707e8'} |
NuGet | GHSA-5rq8-3wvf-wrfg | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0917, CVE-20... | {'CVE-2019-0933'} | 2022-03-03T05:13:40.307258Z | 2021-03-29T20:59:01Z | HIGH | null | {'CWE-787'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-0933', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0933', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://github.com/chakra-core/ChakraCore/commit/1a550c67b33b27675c0553152cabd09e4ffe3abf'} | null | {'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://github.com/chakra-core/ChakraCore/commit/1a550c67b33b27675c0553152cabd09e4ffe3abf'} | {'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://github.com/chakra-core/ChakraCore/commit/1a550c67b33b27675c0553152cabd09e4ffe3abf'} |
NuGet | GHSA-9735-p6r2-2hgh | Out-of-bounds write | A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0884, CVE-2019-0918. | {'CVE-2019-0911'} | 2022-03-03T05:14:13.817901Z | 2021-03-29T21:00:00Z | HIGH | null | {'CWE-787'} | {'https://github.com/chakra-core/ChakraCore/commit/a2deba5e1850782014a2a34678464b251e448337', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0911', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0911'} | null | {'https://github.com/chakra-core/ChakraCore/commit/a2deba5e1850782014a2a34678464b251e448337', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'} | {'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://github.com/chakra-core/ChakraCore/commit/a2deba5e1850782014a2a34678464b251e448337'} |
NuGet | GHSA-g6j2-ch25-5mmv | Missing Token Replay Detection in Saml2 Authentication services for ASP.NET | ### Impact
Token Replay Detection is an important defence in depth measure for Single Sign On solutions. In all previous 2.X versions, the Token Replay Detection is not properly implemented.
Note that version 1.0.1 is not affected. It has a correct Token Replay Implementation and is safe to use.
### Patches
The 2.5.... | {'CVE-2020-5261'} | 2022-03-03T05:12:39.287527Z | 2020-03-25T16:52:49Z | HIGH | null | {'CWE-294'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-5261', 'https://github.com/Sustainsys/Saml2/commit/e58e0a1aff2b1ead6aca080b7cdced55ee6d5241', 'https://github.com/Sustainsys/Saml2/issues/711', 'https://github.com/Sustainsys/Saml2/security/advisories/GHSA-g6j2-ch25-5mmv'} | null | {'https://github.com/Sustainsys/Saml2/commit/e58e0a1aff2b1ead6aca080b7cdced55ee6d5241'} | {'https://github.com/Sustainsys/Saml2/commit/e58e0a1aff2b1ead6aca080b7cdced55ee6d5241'} |
NuGet | GHSA-74r6-grj9-8rq6 | Remote Code Execution in AjaxNetProfessional | All versions of package ajaxpro.2 are vulnerable to Deserialization of Untrusted Data due to the possibility of deserialization of arbitrary .NET classes, which can be abused to gain remote code execution. | {'CVE-2021-23758'} | 2022-03-03T05:14:12.800341Z | 2021-12-16T15:27:55Z | CRITICAL | null | {'CWE-502'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-23758', 'https://snyk.io/vuln/SNYK-DOTNET-AJAXPRO2-1925971', 'https://github.com/michaelschwarz/Ajax.NET-Professional/commit/b0e63be5f0bb20dfce507cb8a1a9568f6e73de57', 'https://github.com/michaelschwarz/Ajax.NET-Professional/security/advisories/GHSA-6r7c-6w96-8pvw', 'https://... | null | {'https://github.com/michaelschwarz/Ajax.NET-Professional/commit/b0e63be5f0bb20dfce507cb8a1a9568f6e73de57'} | {'https://github.com/michaelschwarz/Ajax.NET-Professional/commit/b0e63be5f0bb20dfce507cb8a1a9568f6e73de57'} |
NuGet | GHSA-59cj-99cw-rq64 | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0917, CVE-2019-0922, CVE-20... | {'CVE-2019-0913'} | 2022-03-03T05:13:23.375718Z | 2021-03-29T21:00:05Z | HIGH | null | {'CWE-787'} | {'https://github.com/chakra-core/ChakraCore/commit/d85b5025b047f10784c53c6c1dd771775d417f5f', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0913', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0913'} | null | {'https://github.com/chakra-core/ChakraCore/commit/d85b5025b047f10784c53c6c1dd771775d417f5f', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'} | {'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://github.com/chakra-core/ChakraCore/commit/d85b5025b047f10784c53c6c1dd771775d417f5f'} |
NuGet | GHSA-8hfj-j24r-96c4 | Path Traversal: 'dir/../../filename' in moment.locale | ### Impact
This vulnerability impacts npm (server) users of moment.js, especially if user provided locale string, eg `fr` is directly used to switch moment locale.
### Patches
This problem is patched in 2.29.2, and the patch can be applied to all affected versions (from 1.0.1 up until 2.29.1, inclusive).
### Workarou... | {'CVE-2022-24785'} | 2022-04-26T21:00:11.102341Z | 2022-04-04T21:25:48Z | HIGH | null | {'CWE-27', 'CWE-22'} | {'https://www.tenable.com/security/tns-2022-09', 'https://github.com/moment/moment', 'https://github.com/moment/moment/commit/4211bfc8f15746be4019bba557e29a7ba83d54c5', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24785', 'https://github.com/moment/moment/security/advisories/GHSA-8hfj-j24r-96c4'} | null | {'https://github.com/moment/moment/commit/4211bfc8f15746be4019bba557e29a7ba83d54c5'} | {'https://github.com/moment/moment/commit/4211bfc8f15746be4019bba557e29a7ba83d54c5'} |
NuGet | GHSA-mg98-x2cm-4cpf | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1062, CVE-2019-1092, CVE-2019-1103, CVE-2019-1107. | {'CVE-2019-1106'} | 2022-03-03T05:13:07.842305Z | 2021-03-29T20:59:15Z | HIGH | null | {'CWE-787'} | {'https://github.com/chakra-core/ChakraCore/commit/75162b7f2d8ac2b37d17564e9c979ba1bae707e8', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1106', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1106', 'https://github.com/chakra-core/ChakraCore/commit/362e96537af207be3ecf7fa32f338229ee1dcc46'} | null | {'https://github.com/chakra-core/ChakraCore/commit/75162b7f2d8ac2b37d17564e9c979ba1bae707e8', 'https://github.com/chakra-core/ChakraCore/commit/362e96537af207be3ecf7fa32f338229ee1dcc46'} | {'https://github.com/chakra-core/ChakraCore/commit/362e96537af207be3ecf7fa32f338229ee1dcc46', 'https://github.com/chakra-core/ChakraCore/commit/75162b7f2d8ac2b37d17564e9c979ba1bae707e8'} |
NuGet | GHSA-6973-94v8-5mgw | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0989, CVE-2019-0992, CVE-2019-0993, CVE-2019-1002, CVE-2019-1003, CVE-2019-1024, CVE-20... | {'CVE-2019-0991'} | 2022-03-03T05:11:51.614144Z | 2021-03-29T20:57:42Z | HIGH | null | {'CWE-787'} | {'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0991', 'https://github.com/chakra-core/ChakraCore/commit/3d6226cc2d1077537220361c82e34a362c6c76ee', 'https://github.com/chakra-core/ChakraCore/commit/1caa4118796d33513bc40ce894c053a92de98abb', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0991'} | null | {'https://github.com/chakra-core/ChakraCore/commit/3d6226cc2d1077537220361c82e34a362c6c76ee', 'https://github.com/chakra-core/ChakraCore/commit/1caa4118796d33513bc40ce894c053a92de98abb'} | {'https://github.com/chakra-core/ChakraCore/commit/3d6226cc2d1077537220361c82e34a362c6c76ee', 'https://github.com/chakra-core/ChakraCore/commit/1caa4118796d33513bc40ce894c053a92de98abb'} |
NuGet | GHSA-r8hp-5m7c-jhv4 | Cross-site Scripting OrchardCore.Application.Cms.Targets | Cross-site Scripting (XSS) - Stored in NuGet OrchardCore.Application.Cms.Targets prior to 1.2.2. | {'CVE-2022-0274'} | 2022-03-03T05:10:01.498753Z | 2022-01-21T23:08:50Z | MODERATE | null | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0274', 'https://github.com/orchardcms/orchardcore', 'https://huntr.dev/bounties/a82a714a-9b71-475e-bfc3-43326fcaf764', 'https://github.com/orchardcms/orchardcore/commit/218f25ddfadb66a54de7a82dffe3ab2e4ab7c4b4'} | null | {'https://github.com/orchardcms/orchardcore/commit/218f25ddfadb66a54de7a82dffe3ab2e4ab7c4b4'} | {'https://github.com/orchardcms/orchardcore/commit/218f25ddfadb66a54de7a82dffe3ab2e4ab7c4b4'} |
NuGet | GHSA-p23j-g745-8449 | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1307, CVE-2019-1308, CVE-2019-1366. | {'CVE-2019-1335'} | 2022-03-03T05:13:53.507688Z | 2021-03-29T20:55:40Z | HIGH | null | {'CWE-787'} | {'https://github.com/chakra-core/ChakraCore/commit/a4e56547fb8b7450656bfd26dfc52b8477c8ef27', 'https://github.com/chakra-core/ChakraCore/commit/cc871514deeaeaedb5b757c2ca8cd4ab9abccb5d', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1335', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1335'} | null | {'https://github.com/chakra-core/ChakraCore/commit/cc871514deeaeaedb5b757c2ca8cd4ab9abccb5d', 'https://github.com/chakra-core/ChakraCore/commit/a4e56547fb8b7450656bfd26dfc52b8477c8ef27'} | {'https://github.com/chakra-core/ChakraCore/commit/a4e56547fb8b7450656bfd26dfc52b8477c8ef27', 'https://github.com/chakra-core/ChakraCore/commit/cc871514deeaeaedb5b757c2ca8cd4ab9abccb5d'} |
NuGet | GHSA-9pq7-rcxv-47vq | Incorrect Regular Expression in RestSharp | RestSharp < 106.11.8-alpha.0.13 uses a regular expression which is vulnerable to Regular Expression Denial of Service (ReDoS) when converting strings into DateTimes. If a server responds with a malicious string, the client using RestSharp will be stuck processing it for an exceedingly long time. Thus the remote server ... | {'CVE-2021-27293'} | 2022-03-03T05:13:17.456498Z | 2021-07-14T19:10:01Z | HIGH | null | {'CWE-697', 'CWE-185'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-27293', 'https://restsharp.dev/', 'https://github.com/restsharp/RestSharp/issues/1556', 'https://github.com/restsharp/RestSharp/commit/be39346784b68048b230790d15333574341143bc'} | null | {'https://github.com/restsharp/RestSharp/commit/be39346784b68048b230790d15333574341143bc'} | {'https://github.com/restsharp/RestSharp/commit/be39346784b68048b230790d15333574341143bc'} |
NuGet | GHSA-qv8q-v995-72gr | Validation bypass vulnerability | Back in min June a security vulnerability was reported to the team, the reason for the slow response was due to ownership of some packages
was locked and we wanted to be sure to update all packages before any disclosure was released.
The issue is deemed being a Low severity vulnerability.
### Impact
This vulnerabili... | null | 2022-03-03T05:12:56.256760Z | 2020-09-09T17:29:38Z | LOW | null | null | {'https://github.com/personnummer/csharp/commit/d7ac9b60a3677cd841a488b4f82ac6930f168699', 'https://www.nuget.org/packages/Personnummer/', 'https://github.com/personnummer/csharp/security/advisories/GHSA-qv8q-v995-72gr'} | null | {'https://github.com/personnummer/csharp/commit/d7ac9b60a3677cd841a488b4f82ac6930f168699'} | {'https://github.com/personnummer/csharp/commit/d7ac9b60a3677cd841a488b4f82ac6930f168699'} |
NuGet | GHSA-2ghc-6v89-pw9j | Prototype Pollution in body-parser-xml | body-parser-xml is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | {'CVE-2021-3666'} | 2021-09-14T18:39:31Z | 2021-09-14T20:25:35Z | HIGH | null | {'CWE-915', 'CWE-1321'} | {'https://github.com/fiznool/body-parser-xml', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3666', 'https://huntr.dev/bounties/1-other-fiznool/body-parser-xml', 'https://github.com/fiznool/body-parser-xml/commit/d46ca622560f7c9a033cd9321c61e92558150d63'} | null | {'https://github.com/fiznool/body-parser-xml/commit/d46ca622560f7c9a033cd9321c61e92558150d63'} | {'https://github.com/fiznool/body-parser-xml/commit/d46ca622560f7c9a033cd9321c61e92558150d63'} |
NuGet | GHSA-8j9v-h2vp-2hhv | XSS in HtmlSanitizer | ### Impact
If you have explicitly allowed the `<style>` tag, an attacker could craft HTML that includes script after passing through the sanitizer. The default settings disallow the `<style>` tag so there is no risk if you have not explicitly allowed the `<style>` tag.
### Patches
The problem has been fixed in versi... | {'CVE-2020-26293'} | 2022-03-03T05:12:47.065847Z | 2021-01-04T18:22:11Z | LOW | null | {'CWE-79', 'CWE-74'} | {'https://github.com/mganss/HtmlSanitizer/commit/a3a7602a44d4155d51ec0fbbedc2a49e9c7e2eb8', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26293', 'https://github.com/mganss/HtmlSanitizer/releases/tag/v5.0.372', 'https://github.com/mganss/HtmlSanitizer/security/advisories/GHSA-8j9v-h2vp-2hhv', 'https://www.nuget.org/packag... | null | {'https://github.com/mganss/HtmlSanitizer/commit/a3a7602a44d4155d51ec0fbbedc2a49e9c7e2eb8'} | {'https://github.com/mganss/HtmlSanitizer/commit/a3a7602a44d4155d51ec0fbbedc2a49e9c7e2eb8'} |
NuGet | GHSA-88cw-3m6x-49f7 | Out-of-bounds Write in ChakraCore | Chakra Scripting Engine Memory Corruption Vulnerability This CVE ID is unique from CVE-2020-17048. | {'CVE-2020-17054'} | 2022-03-03T05:13:17.628779Z | 2021-08-02T17:25:58Z | HIGH | null | {'CWE-787'} | {'https://github.com/chakra-core/ChakraCore/pull/6528/commits/e81e8a51ec7ba3d0dfb6089254f166c2733216e1', 'https://nvd.nist.gov/vuln/detail/CVE-2020-17054', 'https://github.com/chakra-core/ChakraCore/pull/6528', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17054'} | null | {'https://github.com/chakra-core/ChakraCore/pull/6528/commits/e81e8a51ec7ba3d0dfb6089254f166c2733216e1'} | {'https://github.com/chakra-core/ChakraCore/pull/6528/commits/e81e8a51ec7ba3d0dfb6089254f166c2733216e1'} |
NuGet | GHSA-pcgf-qjx2-qv4q | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1138, CVE-2019-1237, CVE-2019-1298, CVE-2019-1300. | {'CVE-2019-1217'} | 2022-03-03T05:14:05.834729Z | 2021-03-29T20:56:08Z | HIGH | null | {'CWE-787'} | {'https://github.com/chakra-core/ChakraCore/commit/b75847eb1ef4136d49e119c072266d8874a6e41e', 'https://github.com/chakra-core/ChakraCore/commit/7e9a2ee60baa95ceb4f48f522f823c812ca90c80', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1217', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1217'} | null | {'https://github.com/chakra-core/ChakraCore/commit/b75847eb1ef4136d49e119c072266d8874a6e41e', 'https://github.com/chakra-core/ChakraCore/commit/7e9a2ee60baa95ceb4f48f522f823c812ca90c80'} | {'https://github.com/chakra-core/ChakraCore/commit/b75847eb1ef4136d49e119c072266d8874a6e41e', 'https://github.com/chakra-core/ChakraCore/commit/7e9a2ee60baa95ceb4f48f522f823c812ca90c80'} |
NuGet | GHSA-vpc2-7xmf-ppmf | Out-of-bounds Write in ChakraCore | Chakra Scripting Engine Memory Corruption Vulnerability This CVE ID is unique from CVE-2020-17054. | {'CVE-2020-17048'} | 2022-03-03T05:14:01.644069Z | 2021-08-02T17:26:11Z | HIGH | null | {'CWE-787'} | {'https://github.com/chakra-core/ChakraCore/pull/6528/commits/90e222e9a9ba64bd808666f44e6a0913d6318f78', 'https://nvd.nist.gov/vuln/detail/CVE-2020-17048', 'https://github.com/chakra-core/ChakraCore/pull/6528', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17048'} | null | {'https://github.com/chakra-core/ChakraCore/pull/6528/commits/90e222e9a9ba64bd808666f44e6a0913d6318f78'} | {'https://github.com/chakra-core/ChakraCore/pull/6528/commits/90e222e9a9ba64bd808666f44e6a0913d6318f78'} |
NuGet | GHSA-v648-p92f-9996 | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0917, CVE-20... | {'CVE-2019-0925'} | 2022-03-03T05:14:19.461609Z | 2021-03-29T20:57:39Z | HIGH | null | {'CWE-787'} | {'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0925', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0925', 'https://github.com/chakra-core/ChakraCore/commit/32ca10f3955f2a3ca56c6671c721b1264eca06b8'} | null | {'https://github.com/chakra-core/ChakraCore/commit/32ca10f3955f2a3ca56c6671c721b1264eca06b8', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'} | {'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://github.com/chakra-core/ChakraCore/commit/32ca10f3955f2a3ca56c6671c721b1264eca06b8'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.